Academia.eduAcademia.edu

Outline

Confidentiality of event data in policy-based monitoring

2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)

https://doi.org/10.1109/DSN.2012.6263954

Abstract

Monitoring systems observe important information that could be a valuable resource to malicious users: attackers can use the knowledge of topology information, application logs, or configuration data to target attacks and make them hard to detect. The increasing need for correlating information across distributed systems to better detect potential attacks and to meet regulatory requirements can potentially exacerbate the problem if the monitoring is centralized. A single zero-day vulnerability would permit an attacker to access all information. This paper introduces a novel algorithm for performing policy-based security monitoring. We use policies to distribute information across several hosts, so that any host compromise has limited impact on the confidentiality of the data about the overall system. Experiments show that our solution spreads information uniformly across distributed monitoring hosts and forces attackers to perform multiple actions to acquire important data.

References (28)

  1. C. Tankard and D. Pathways, "Persistent threats and how to monitor and deter them," in Network Security, Science Direct, vol. 2011, no. 8, pp. 16-19, 2011.
  2. G. Gu, J. Zhang, and W. Lee, "BotSniffer: Detecting botnet command and control channels in network traffic," in Network & Distributed System Security Symposium (NDSS), 2008.
  3. "Splunk," 2011. http://www.splunk.com/
  4. "Bro Intrusion Detection System," 2011. http://bro-ids.org/
  5. "Simple Event Correlator," 2011. http://simple-evcorr.sourceforge.net/
  6. M. Vallentin, R. Sommer, J. Lee, and C. Leres, "The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware," in Recent Advances in Intrusion Detection Symposium (RAID), 2007.
  7. "DigiNotar reports security incident," 2011. http: //www.vasco.com/company/press room/news archive/2011/news diginotar reports security incident.aspx
  8. "Security Content Automation Protocol Validated Products," 2011. http://nvd.nist.gov/scapproducts.cfm
  9. Payment Card Industry Security Standards Council, "Payment Card Industry (PCI) Data Security Standard," Tech. Rep. October, 2010. http://en.scientificcommons.org/8858188
  10. "Federal Information Security Management Act (FISMA) Implementa- tion Project," 2011. http://csrc.nist.gov/groups/SMA/fisma/index.html
  11. S. Ceri, G. Gottlob, and L. Tanca, "What you always wanted to know about Datalog(and never dared to ask)," IEEE Transactions on Knowledge and Data Engineering, vol. I, no. 1, 1989.
  12. Y. Deswarte, L. Blain, J.-C. Fabre, "Intrusion tolerance in distributed computing systems," IEEE Symposium on Research in Security and Privacy, 1991.
  13. "Syslog-ng Logging System," 2011. http://www.balabit.com/ network-security/syslog-ng/
  14. B. Schneier and J. Kelsey, "Cryptographic support for secure logs on untrusted machines," in USENIX Security Symposium, 1998.
  15. D. Ma and G. Tsudik, "A new approach to secure logging," ACM Transactions on Storage, vol. 5, no. 1, pp. 1-21, Mar. 2009.
  16. P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-preserving sharing and correction of security alerts," in USENIX Security Symposium. 2004.
  17. D. Xu and P. Ning, "Privacy-Preserving Alert Correlation : A Concept Hierarchy Based Approach," in Annual Computer Security Applications Conference (ACSAC), 2005.
  18. B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing privacy in enterprise packet trace anonymization," in Network & Distributed Systems Security Symposium (NDSS) , 2008.
  19. J. King, K. Lakkaraju, and A. Slagell, "A taxonomy and adversarial model for attacks against network log anonymization," in ACM Sympo- sium on Applied Computing (SAC). 2009.
  20. T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection," in Network & Distributed Systems Security Symposium (NDSS), 2003.
  21. M. Montanari, E. Chan, K. Larson, W. Yoo, and R. H. Campbell, "Distributed Security Policy Conformance," in IFIP International In- formation Security Conference (IFIP SEC), 2011.
  22. M. Montanari and R. Campbell, "Attack-resilient compliance monitoring for large distributed infrastructure systems," in IEEE Conference on Network and System Security. 2011.
  23. K. Walzer, T. Breddin, and M. Groch, "Relative temporal constraints in the Rete algorithm for complex event detection," International confer- ence on Distributed Event-Based Systems (DEBS), 2008.
  24. X. Ou and S. Govindavajhala, "Mulval: A logic-based network security analyzer, " in USENIX Security Symposium, 2005.
  25. A. Adi and O. Etzion, "Amit-the situation manager," The International Journal on Very Large Data Bases, vol. 13, no. 2, pp. 177-203, 2004.
  26. B. Sangster, T. O'Connor, T. Cook, R. Fanelli, E. Dean, W. Adams, C. Morrell, and G. Conti, "Toward instrumenting network warfare com- petitions to generate labeled datasets," in Workshop on Cyber security experimentation and Test (CSET). 2009.
  27. D. Kotz, T. Henderson, I. Abyzov, and J. Yeo, "CRAWDAD data set dartmouth/campus (v. 2009-09-09)," http://crawdad.cs.dartmouth.edu/ dartmouth/campus. 2009.
  28. E. Fidler, H. Jacobsen, and G. Li, "The PADRES distributed pub- lish/subscribe system," Feature Interactions in Telecommunications and Software Systems, 2005.