7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public...

40
7/18/2011 Approved for Public Release, Distribution Unlimited

Transcript of 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public...

Page 1: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011 Approved for Public Release, Distribution Unlimited

Page 2: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011 Approved for Public Release, Distribution Unlimited

Understand Connect Empower

Thrust Areas

Mission: Ensure U.S. technological superiority in all areas where information can be a force multiplier and provide a decisive military advantage.

• Intelligence, surveillance, and reconnaissance (ISR) exploitation • Cyber • Language, education and training • Social networking and social sciences

7/18/2011 2

Page 3: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011 Approved for Public Release, Distribution Unlimited

Page 4: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

“If these trends continue through the end of 2009, there would be a 60 percent increase in malicious cyber activity compared to 2008. … in just the preceding six months, the U.S. military alone had spent more than $100 million … to remediate attacks on its networks” 2009 report to Congress of the U.S.-China Economic and Security Review Commission One Hundred Eleventh Congress, November 2009

Page 5: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Stuxnet attacked the software in specialized industrial control equipment made by Siemens

malware was created to attack an Iranian industrial facility

gas and nuclear installations

exploding pipelines and nuclear centrifuges spinning so fast that they break

It’s a cyber weapon basically

Approved for Public Release, Distribution Unlimited 5 7/18/2011

(NY Times)

Page 6: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 7: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

The cyber attacks beganwhen the Russian military operations began

one target that was somewhat unusual from a military standpoint was a website for renting diesel-power electric generators

the news media and communications facilities

were spared physical destruction, presumably because they were being effectively shut down by cyber attacks

Approved for Public Release, Distribution Unlimited 7/18/2011

Overview by the US-CCU of the Cyber Campaign against Georgia in August 2008

7

Page 8: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 9: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Fortress (Traditional) Organism

• Impenetrable (hopefully) • Monolithic • Single layer • Rigid • Immobile

• Many partial barriers • Heterogeneous • Defense in depth and self healing • Adapts, learns, evolves • Mobile

Page 10: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Computation Biological

Near Perfect Components Fallible components

Core design formed in era of scarcity Abundance of resources

Core design formed in isolated environment Evolution in ecosystem of predators and parasites

Evolutionary pressure from market: price, performance and features

Evolutionary pressure from ecosystem: survivability

Self-regulation and adaptation rarely considered. Runs open-loop.

Self-regulation and adaptation are core mechanisms. Closed loop control.

No enterprise-wide survivability mechanisms Diversity for population survival Public-health systems in human society

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 11: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

B cells

natural killer (NK) cells

CD3/CD4 T cell

CD3/CD8 T cell

thymus CD4

CD16/ 56

neutrophils

macrophages

dendritic cells

A

D

A

P

T

I

V

E

I

N

N

A

T

E

CD8

CD19

At least 20 – 30% of the body’s resources are involved in constant surveillance and containment.

Fast, but inflexible, covers fixed sets of pathogen that are always present. Supports the adaptive immune system.

Approved for Public Release, Distribution Unlimited 7/18/2011

Slower, learns to recognize new sets of pathogens, distinguishes self from non-self, retains memory to guard against future attacks.

Diversity over time and across the population prevents mass extinction

Page 12: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Innate Immunity Adaptive Immunity

Dynamic Diversity

Page 13: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Rep

ort

ed

Vu

lnera

bilit

ies

Code/data

Memory

Provenance

Depends on capturing machines to launch attack using one of the other means

Number of Reported Vulnerabilities by Year by Type

The innate system only has to protect these very few key semantic properties

Page 14: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Compartments: • Compartment = Collection of Data with

common access rights • Every thread has an associated compartment

(where it can allocate data) • Organized in a lattice

Principals: • Principal = An active entity • Each running process has an associated

principal • Principals are organized in a lattice

+ =

Access Rules: • For each operation, a matrix of which principals can

perform the operation on data in which compartments • Specifies compartment of result • Collectively enforces a policy restricting flows between

compartments

Objects: • Memory is a structured collection of objects • Objects have: Type, Bounds, Identity

Page 15: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 16: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 17 7/18/2011

Register File Result Data

Tags Unit

Operand 1

Operand 2

Tag 1

Instruction Result Tag

Trap Signal

A L U

Tag 2

Memory

Bounds

Type

Provenance

Conventional Computer

Meta-computing System

Tag

Data

Thread’s Principal Access Rules

Data

Tag

Page 17: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Dual and Quad Core Opterons

Tag Processing Unit is about 125K bits

125,000 SRAM bits < 16K Bytes Note: L1 Dcache on Opteron is 64KB

Page 18: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 19: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

System Models

Trust Model: Behavior

Compromises Attacks

Recovery And Regeneration

Adaptive Method Selection

Detection

Diagnosis

Attack Plan Recognition

Instrumentation Synthesizer

Application Software

Instrumentation

Machine Learning

Attack Plan

Library

Other Sensors: Intrusion Detectors

7/18/2011 Approved for Public Release, Distribution Unlimited 20

Page 20: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

compartment

principal

satellite

Approved for Public Release, Distribution Unlimited 7/18/2011

Process Manager Log Manager Satellite for Interaction

Gate to control interaction

Gate to control interaction

Kernel

User 1

User 2

Kernel: OSX Windows, Unix

21

Page 21: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Page 22: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011 Approved for Public Release, Distribution Unlimited 7/18/2011

One attack fits them all

23

Page 23: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011

Code and/or data blocks are periodically repositioned in memory so that attacker has to work harder to find a target.

Garbage-Collected memory has the property inherently, new methods may optimize for increased entropy.

Address space randomization

Instruction-1

Instruction-2

Instruction-3

Encrypted-1

Encrypted-2

Encrypted-3

Code is encrypted as it enters memory and Decrypted as it enters the instruction cache (or translation buffer). Injected code in native instruction set is then encrypted and not executable. Encryption key can be varied by process and time.

Disk Memory instruction-1

instruction-2

instruction-3

ICache

Instruction set randomization

Functional Redundancy & Decision Theoretic Dispatch

Methodij

Goali

There are multiple methods for achieving each goal (“n-version programming”). Each distinct method has different qualities of service. Method selection is driven both by preferences over QoS and by need for unpredictability.

QoSij

Instruction-4

Instruction-5

Instrution-6

Encrypted-4

Injected-1

Injected-2

instruction-4

Encrypted-1

Encrypted-1

Encrypted-5

Encrypted-6

instruction-5

instruction-6

Page 24: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Clean-slate mission-aware security for cloud computing and enterprise-scale networked systems

Approved for Public Release, Distribution Unlimited 7/18/2011 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 25: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Motivations for moving to the cloud:

• (Undisputed) Economic efficiency of large scale data centers for both computation and storage

• (Putative) Manageability of large scale data centers

• Availability of “fungible computation” on demand

• Conceptual centralization of data for common analytics (ISAT

“War Clouds” study)

26 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 26: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Conficker Infected Hosts

Feb 2011

1

100

10,000

1,000,000

0 20 40 60Slammer (Jan 2003)

Blaster (Aug 2003)

Timeline (hours from release)

Ho

sts

In

fecte

d

27 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 27: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Virtual Machine

Virtual Machine Virtual

Machine

Virtual Machine

Multicore Chip 1U Blade in Blade Server

Blade Server Racks Blade Server Network Modular Data Center Containers

Your Software Lives Here

Your Software Lives On A Network with 100K Other Virtual Machines and

Few Internal Firewalls

Approved for Public Release, Distribution Unlimited 7/18/2011 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 28: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

Approved for Public Release, Distribution Unlimited 7/18/2011 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 29: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011 30 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 30: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Taskable Diversity Mission-Aware Networking

Initiating the Mission: Tasks are assigned to hosts and the network is configured to maximize mission effectiveness

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 3-5

Task

s 13-1

6

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Task

s 10-1

2

31 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 31: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Taskable Diversity Mission-Aware Networking

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 3-5

Task

s 13-1

6

Task

s 10-1

2

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Quorum Algorithm Over Multiple Instances of Task 13 Detects Violation

32 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 32: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Migrate Task 16 to unaffected host

Taskable Diversity Mission-Aware Networking

Task

s 13-1

6

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 3-5

,16

Task

s 10-1

2

33 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 33: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Increase communication network priority for host receiving task 16

Taskable Diversity Mission-Aware Networking

Task

s 13-1

6

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 3-5

,16

Task

s 10-1

2

34 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 34: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Detectors, Patches & Workarounds for Task 13 vulnerability are distributed to all affected hosts

Taskable Diversity Mission-Aware Networking

Task

s 13-1

6

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 3-5

,16

Task

s 10-1

2

35 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 35: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Attempt to communicate with hostile domain is detected. Global plan for botnet attack is recognized.

Taskable Diversity Mission-Aware Networking

Shared Situational Awareness Mission-aware Resource Optimization

Network Isolation and Monitoring

Task

s 13-1

6

Task

s 1-3

Task

s 13-1

5

Task

s 6-8

Task

s 11-1

3

Task

s 1-5

Task

s 3-5

,16

Task

s 10-1

2

36 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 36: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Quarantine hosts running Task 13. Migrate Tasks 11, 12, 14, and 15 from those hosts. Accept degraded performance on Tasks 11 and 15.

Taskable Diversity Mission-Aware Networking

Distributed, Highly Resilient Cloud Defense System

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 13-1

6

Task

s 1-

3,1

2,1

4

Task

s 13-1

5

Task

s 6-

8,1

2,1

4

Task

s 11-1

3

Task

s 1-5

,11

Task

s 3-

5,1

5,1

6

Task

s 10-1

2

Network Isolation and Monitoring

37 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 37: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Uncompromised hosts directed to employ additional diversity. Network directed to perform “IP hopping”.

Task 14 sacrificed to compensate for diversity cost.

Taskable Diversity Mission-Aware Networking

Shared Situational Awareness Mission-aware Resource Optimization

Task

s 13-1

6

Task

s 1-3

,12

Task

s 13-1

5

Task

s 6-8

,12

Task

s 11-1

3

Task

s 1-5

,11

Task

s 3-

5,1

5,1

6

Task

s 10-1

2

Network Isolation and Monitoring

38 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Distributed, Highly Resilient Cloud Defense System

Page 38: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

Information flow Control flow

Innate Immunity Adaptive Immunity Manageable Diversity

Innate Distributed Defense

Shared Situational Awareness, Trust Modeling, and Diagnosis

Manageable & Taskable Diversity

Cyber-Mission Resilience

Mission-Aware Networking

Optimizing Mission and Resources

CRASH Technologies

Resilient Clouds Technologies

Combined Goal of CRASH & Resilient Clouds

39 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 39: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

7/18/2011

RESILIENT CLOUDS CRASH

Herd immunity Individual immunity

Community-wide Public Health Self-healing

Manageable diversity across the entire ensemble Diversity of individual over time

Focused on achieving mission goals even if a host or network needs to be sacrificed

Focused on preserving the computations within a host

40 Approved for Public Release, Distribution Unlimited 7/18/2011 Approved for Public Release, Distribution Unlimited

Page 40: 7/18/2011 Approved for Public Release, Distribution Unlimited€¦ · 7/18/2011 Approved for Public Release, Distribution Unlimited “If these trends continue through the end of

www.darpa.mil

Approved for Public Release, Distribution Unlimited 7/18/2011 7/18/2011 Approved for Public Release, Distribution Unlimited