A Quantitative Risk Assessment of AeroMACS Security in...

23
1 PAPER 11ATC-0193 A Quantitative Risk Assessment of AeroMACS Security in SESAR Mohamed Slim Ben Mahmoud Nicolas Larrieu Alain Pirovano Ecole Nationale de l’Aviation Civile (ENAC), LEOPART Team

Transcript of A Quantitative Risk Assessment of AeroMACS Security in...

Page 1: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

1 PAPER 11ATC-0193

A Quantitative Risk Assessment of AeroMACS Security in SESAR

Mohamed Slim Ben MahmoudNicolas LarrieuAlain Pirovano

Ecole Nationale de l’Aviation Civile (ENAC), LEOPART Team

Page 2: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

2 PAPER 11ATC-01932

Problem Statement AeroMACS in SESAR Simulation Campaign Security Guidance Conclusion and Future Work

Outline

Page 3: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

3 PAPER 11ATC-01933

Why network security risk assessment is so important? It helps to:◦ Estimate the potential damages caused by cyber attacks◦ Decide which security policy is better for the network

Critical step in the risk management lifecycle How many type of network security risks are usually

considered?◦ Individual risk per node (own vulnerabilities)◦ Network risk (considered as the sum of individual risks)◦ BUT...in a computer network, nodes are connected

Problem Statement (1)

Network security can be compromised by node communications!!

Page 4: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

4 PAPER 11ATC-01934

What about node interconnections? Common mistakes

◦ Only vulnerabilities specific to a node can be exploited to attack that node

◦ Low (high) individual risks -> Low (high) network risk◦ Network risk = sum of all individual risks + risk due to...

Service dependency/node correlation◦ Network intrusions/attacks process is transitive !

Problem Statement (2)

Network Security Risk Propagation !

Page 5: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

5 PAPER 11ATC-01935

Security Risk Propagation Example

Page 6: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

6 PAPER 11ATC-01936

Besides network risk propagation... Network risk assessment approaches:

◦ Qualitative Based on security expert’s investigation and past experiences

◦ Quantitative Based on mathematical/theoretical models

What is wrong with qualitative approaches?

Problem Statement (3)

Page 7: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

7 PAPER 11ATC-01937

Problem Statement (4)Point of view Qualitative Approaches Quantitative Approaches

Subjectivity Rely on security experts intuitivity and past experiences Pedestrian risk evaluation (e.g. low, medium, high)

Rely on strong theoretical models (e.g. tree-based attack graphs) Less subjectivity (...but the model design can always be discussed)

Efficiency

Impossible to compare two risks classified in the same level Impossible to estimate the distance between two risk levels Exposed to computation errors (human in the loop)

Comparison is always possible Less computation errors (automated procedure)

Cost Time-consuming (e.g. questionnaires collection/analysis) Security expertise requires monetary founds

Faster compared to qualitative risk assessment approaches No extra-expense for security expertise

Published in proceedings of the 6th International Conf. on Network Architectures and Information Systems Security

Quantitative risk assessment methodology for network security based on risk propagation concept !

Page 8: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

8 PAPER 11ATC-01938

Aeronautical context◦ EUROCONTROL SESAR WP 15.2.7

ENAC task◦ Apply the developed risk assessment methodology to mitigate

the AeroMACS network risk in the airport surface segment◦ According to the results, provide some security guidances

What is AeroMACS?◦ C-band WiMAX-derived technology (IEEE 802.16e)◦ Airport RAMP, GROUND, and TOWER surface zones.◦ Envisaged traffic : ATS, AOC, and NET operational services

AeroMACS in SESAR

Security is a very important concern in AeroMACS communications !

Page 9: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

9 PAPER 11ATC-01939

AeroMACS provides a built-in privacy sub-layer ◦ Lessons have been learned from the WiFi experience...◦ PKM framework (key management)◦ Advanced cryptographic algorithms (e.g. AES, RSA, EAP)◦ Security Associations, mutual authentication, etc

Still...◦ many security weaknesses exist

Unauthenticated management messages (MITM attacks) Unencrypted management messages (Eavedrop) Shared keys in multicast/broadcast services (key forgery)

AeroMACS Security

A risk assessment study could be handy to mitigate the risks related to these weaknesses

Page 10: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

10 PAPER 11ATC-019310

AeroMACS Network Topology

Page 11: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

11 PAPER 11ATC-019311

Assumptions◦ 9 BSs, 10 aircraft, and 12 surface vehicles◦ Vulnerability data extracted from the NVD database◦ Node correlation data based on statistics from the COCR◦ No vulnerability for the on-board embedded network

Simulation goals◦ Vulnerability statistics◦ Individual/propagated/network risk estimation◦ Comparison between two authentication approaches

EAP (Enhanced Authentication Protocol) RFC 3748 RSA (Rivest, Shamir, Aldman)

◦ Result analysis and guidance’s provision

Simulation Campaign

Page 12: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

12 PAPER 11ATC-019312

Individual risk results are dictated by the vulnerability inputs from the NVD database

Individual Risks

Strong relationship between the individual risks and the number of specific vulnerabilities

Page 13: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

13 PAPER 11ATC-019313

Individual risks as a function of number of vulnerabilities

Individual Risks (2)

What about propagated risks?

Page 14: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

14 PAPER 11ATC-019314

Propagated RisksNODE ID Propagated Risk

Base stations (1 to 6) 7. 474

Base stations 7 and 8 9. 965

Base station 9 12. 456

Aircraft (1 to 6) 0. 812

Aircraft (7 to 12) 1. 082

Vehicles (1 to 6) 0. 812

Vehicles 7 and 81. 082

Vehicles 9 and 10 1. 353

ASN Gateway 538. 998

DHCP Server 1. 2

AAA Server 1. 2

ATS Server 0. 398

AOC Server 0. 750

AP Server 0. 135

Page 15: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

15 PAPER 11ATC-019315

Propagated Risks (2) Node connectivity is an important parameter for the

propagated risk

The ASN Gateway is the point of failure of the risk analysis, why?

Page 16: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

16 PAPER 11ATC-019316

Network Risk

Network risk contribution percentage(per node)

ASN Gateway contribution percentage (per node)

AeroMACS security should be discussed to mitigate these risks: RSA vs. EAP protocols

Page 17: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

17 PAPER 11ATC-019317

EAP vs. RSA Sub-Scenario-Individual Risks-

Surprisingly, RSA is more vulnerable than EAP Higher number of vulnerabilities, but...a lower average CVSS score

Page 18: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

18 PAPER 11ATC-019318

EAP vs. RSA Sub-Scenario- Propagated Risks -

Page 19: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

19 PAPER 11ATC-019319

EAP vs. RSA Sub-Scenario- Network Risks -

No change for the ASN Gateway since we have not modified the node connectivity

Page 20: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

20 PAPER 11ATC-019320

Implementation guidances:◦ Best trade-off between # of vulnerabilities and average CVSS◦ This should guarantee the lowest individual risks on each node

Topological guidances:◦ Two ASN Gateways (point of failure of risk assessment study)

Dispatch the base stations and mobile stations Less connectivity and correlation between the Gateway and IP nodes

Security guidances:◦ AeroMACS authentication: EAP instead of RSA

Better results (but based on known vulnerabilities...)◦ Higher layer security mechanisms as a backup for AeroMACS security

Firewalls, X.509-based certificate authentications

Security Guidances

Page 21: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

21 PAPER 11ATC-019321

Methodology benefits◦ Quantitative risk parameters◦ Network oriented (based on risk propagation)◦ Tool-assistance for security policy establishment◦ Based on existing vulnerability statistics (NVD)

Results for the first simulation scenario ◦ Isolated AeroMACS network

The ASN Gateway is the point of failure of the risk study◦ Comparative study between EAP and RSA

EAP behaves better in a vulnerability-based methodology◦ Guidances provision to enhance the security of the network

and mitigate the related risks

Contributions Summary

Page 22: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

22 PAPER 11ATC-019322

Currently◦ Simulations for an end-to-end connected AeroMACS network

Firewalls, on-board segment, additional nodes (mobile agent, etc) Methodology improvements/enhancements

◦ Investigation on network risk correlation Bayesian or causal network-based approaches

◦ Predictive network security state Unknown vulnerabilities (not included in NVD database)

Expand the study to an end-to-end network◦ SESAR 15.2.4 WP considering different communication

segments LDACS, AeroMACS, and SATCOM

Future Work

Page 23: A Quantitative Risk Assessment of AeroMACS Security in SESARrecherche.enac.fr/~nlarrieu/lib/exe/fetch.php?media=ppt... · 2011. 11. 23. · SESAR 15.2.4 WP considering different communication

23 PAPER 11ATC-019323

Special thanks to all the SESAR WP 15.2.7 partners for their respective

contributions

Questions?