The DETER Project

44
THE DETER PROJECT: SCIENTIFIC, SAFE AND EASY CYBERSECURITY EXPERIMENTATION Jelena Mirkovic USC Information Sciences Institute [email protected] Sponsored by Dr. Doug Maughan, DHS S&T http://www.isi.edu/deter

description

 

Transcript of The DETER Project

Page 1: The DETER Project

THE DETER PROJECT:

SCIENTIFIC, SAFE AND EASY CYBERSECURITY EXPERIMENTATION

Jelena MirkovicUSC Information Sciences Institute [email protected] by Dr. Doug Maughan, DHS S&Thttp://www.isi.edu/deter

Page 2: The DETER Project

2

Talk Outline

• Long-term Vision: Advanced scientific instrument– Elevate the science of cybersecurity

• Platform: Advanced testbed technology– Robust, diverse, and scalable experiments

• Growing Community: Collaborative science– Effective and efficient sharing

• Next Steps: DETECT – Program to catalyze cybersecurity research

Page 3: The DETER Project

3

Talk Outline

• Long-term Vision: Advanced scientific instrument– Elevate the science of cybersecurity

• Platform: Advanced testbed technology– Robust, diverse, and scalable experiments

• Growing Community: Collaborative science– Effective and efficient sharing

• Next Steps: DETECT – Program to catalyze cybersecurity research

Page 4: The DETER Project

4

DETER Background I

• 20+ years investment in network security research• Platforms needed to efficiently explore design space

Time

Risk

Capability

Page 5: The DETER Project

5

DETER Background II

Dimension Barrier

Language Shared Vocabulary

Safety Risk management

Correctness Realism of setup

Scale Resources

Confidence Rigor, Repeatability

Efficiency AutomationSharing & Community

Flexibility Programmability

• Barriers to network security experimentation

• Systematically addressed by DETER project

Page 6: The DETER Project

6

DETER Goals

• Advance science of cybersecurity experimentation– Rigorous experiments– Repeatable experiments

• Advance testbed technologies– Federation– Risky experiment management

• Share infrastructure / broaden participation– Data, code, results, set up, ideas – Create community knowledge – Simplify, automate use– Testbeds in education

Page 7: The DETER Project

7

Talk Outline

• Long-term Vision: Advanced scientific instrument– Elevate the science of cybersecurity

• Platform: Advanced testbed technology– Robust, diverse, and scalable experiments

• Growing Community: Collaborative science– Effective and efficient sharing

• Next Steps: DETECT – Program to catalyze cybersecurity research

Page 8: The DETER Project

8

The DETER Facility

• Located at USC/ISI and UC Berkeley• Funded by NSF and DHS, started in 2004• 400+ Nodes ~ 200 each at ISI and UC Berkeley• Built with Emulab technology (http://www.emulab.net)

Page 9: The DETER Project

9

Data Center

Page 10: The DETER Project

10

Hardware

11 x Sunpc2800

64 x IBMpc733

64 x Dellpc3000

30 x Sunbpc2800

32 x Dellbpc3000 40 x HP

80 x Dell

64 x Dell

UCB

Cisco 6509 Nortel 5510

Foundry 1500 Nortel 5510

~150Mbps with IPSec

2x 8 x 1Gbps

5x 4 x 1Gbps

1x 4 x 1Gbps

2x 2 x 1Gbps

1 GBps (4 later)

1 GBps (4 later)

Juniper M7i

JuniperIDP-200

Cloud Shield 2200

McAfeeIntrushield 2600

ISI

Page 11: The DETER Project

11

Master Server

NodePower

Controller

N X 4 @1000bTData ports

‘User’ Server

Routerwith Firewall

External VLAN

Node Node

Control Network VLAN

User

ControlDB

Node Serial Line Server

Power Serial Line Server

Userfiles

Ethernet Bridge with Firewall

Programmable Patch Panel (VLAN switch)

Sw

itch C

ontrol Interface

Internet

Web/DB/SNMP,Switch Mgmt

User Acct & Data loggingserver

UsersVLAN

BossVLAN

ControlHardware VLAN

Architecture

Page 12: The DETER Project

12

What is an experiment? Standard definition

• Background environment– Topology (physical nodes), OSes, applications– Cross-traffic– Cross-events

• Events of interest– Attack, intrusion– Worm spread– Botnet recruitment

• Perhaps a defense• Scenario combining the above• Measurement tools, metrics of success• A user specifies EVERY detail

Page 13: The DETER Project

13

Using DETER – summary

• All you need is a Web browser and an SSH client• Open a user account (open to all users)• Create (faculty members or PIs from labs/companies

are eligible) or join a project • Log on to our Web site• Run experiments

– Create a topology, or retrieve an existing one– Nodes are assigned to you

• Exclusive, sudoer access– Load software you need or use DETER sw to create

traffic and events of interest, deploy defenses, monitor (SSH)

• Swap out (return nodes) or terminate (if no longer needed) experiments

Page 14: The DETER Project

14

Using DETER – open account, manage exps

http://www.deterlab.net

Page 15: The DETER Project

15

Using DETER – start an experiment

topology

Page 16: The DETER Project

16

Using DETER – draw a topology

Page 17: The DETER Project

17

Using DETER – manage an experiment

Page 18: The DETER Project

18

• Java front-end and Python back-end, support for many OSes• Open-source, extensible tool

Using DETER – drive an experiment via SEERhttp://seer.isi.deterlab.net

Page 19: The DETER Project

19

DETER Advanced Capabilities

• Policy based federation– Integration of diverse testbeds

• Risky experiment management– Balance realism and safety

Page 20: The DETER Project

20

Federation

On-demand creation of experiments spanning multiple, independently controlled facilitiesResearcher

– Controls experiment embedding

Federants– Control resource access– Constrain resource use

Related to (but not same as) experiment composition

http://fedd.isi.deterlab.net

Page 21: The DETER Project

21

Win for Everyone

Unique facilitiesaccess to specialized resources at different sites

Many communities of interestgeographical areas, federation controlled by policy

Data and knowledge sharingfacilitates collaboration

Information hidingenables multi-party scenarios with controlled views

Extreme scalelarger number of nodes than at any single site

Multiple operating testbed environments

Page 22: The DETER Project

22

Federation System Architecture

ExperimentCreation

ToolFederator

TestbedsExperiment

CreationTool

ExperimentCreation

Tool

TestbedProperties

ExperimentRequirements

ExperimentTopology

CEDL“Assembly Code”

Standard Experiment Representation

Experiment Decomposition Tools

TestbedProperties

Page 23: The DETER Project

23

Risky Experiment Management

• Risks for: testbed, experiments, Internet• Prohibit risky experiments

– But these are necessary for security research• Strict isolation

– Really interesting experiments need to talk to the outside: visit Web sites, download files, Interact with a bot master

• Fixed containment– Difficult to come up with a set of fixed rules that would

work for every experiment• Experiment-driven containment

– Hardest to achieve but results in best utility for experimenters — our approach

Page 24: The DETER Project

24

Two-constraint Approach to Experiment Risk Management

Unconstrainedbehavior

Constrainedbehavior

Experimentbehavior constraint

transform: T1

Testbedbehavior constraint

transform: T2

Behavioral composition model: External behavior = T2(T1(experiment))

Safe and usefulbehavior

Testbed safety goals

User goalsfor research utility

Page 25: The DETER Project

25

Talk Outline

• Long-term Vision: Advanced scientific instrument– Elevate the science of cybersecurity

• Platform: Advanced testbed technology– Robust, diverse, and scalable experiments

• Growing Community: Collaborative science– Effective and efficient sharing

• Next Steps: DETECT – Multi-year program to catalyze cybersecurity

science

Page 26: The DETER Project

26

DETER Users

Class Value

Security Researchers Exploring/validating new ideasPublishing resultsSharing data/tools

Small Companies Testing product prototypes Sharing tools

DHS Constituencies Scenario explorationTraining

Emerging Technologies Data sharing (e.g., PREDICT)Scenario explorationTraining

Education RepeatabilityAbstractionHands-on experience

Page 27: The DETER Project

27

DETER Users

Page 28: The DETER Project

28

DETER User Organizations AcademiaCarnegie Mellon University Columbia University Cornell University Dalhousie University DePaul University George Mason University Georgia State University Hokuriku Research Center ICSIIIT DelhiIRTT ISIJohns Hopkins University Jordan University of Science & TechnologyLehigh University MIT New Jersey Institute of Technology Norfolk State University Pennsylvania State University Purdue University Rutgers University Sao Paulo State UniversitySouthern Illinois UniversityTU Berlin TU DarmstadtTexas A&M University UC Berkeley

GovernmentAir Force Research LaboratoryLawrence Berkeley National LabLawrence Livermore National LabNaval Postgraduate SchoolSandia National Laboratories USAR Information Operations Command

IndustryAgnik, LLC Aerospace CorporationBackbone Security BAE Systems, Inc. BBN Bell LabsCs3 Inc. Distributed Infinity Inc. EADS Innovation Works FreeBSD FoundationiCASTInstitute for Information Industry Intel Research Berkeley IntruGuard Devices, Inc. Purple Streak Secure64 Software Corp Skaion Corporation SPARTASRI International Telcordia Technologies

UC DavisUC Irvine UC Santa Cruz UCLA UCSD UIUC UNC Chapel Hill UNC Charlotte Universidad Michoacana de San NicolasUniversita di Pisa University of Advancing Technology University of Illinois, Urbana-Champaign University of Maryland University of Massachusetts University of Oregon University of Southern CallforniaUniversity of Washington University of Wisconsin - Madison University of Wisconsin-Madison USCUT Arlington UT Austin UT Dallas Washington State University Washington University in St. Louis Western Michigan University Xiangnan UniversityYoungstown State University

Page 29: The DETER Project

29

UCBttc: Example Project

DETER Project Profile

Page 30: The DETER Project

30

Research done on DETER

23

23

18

12

16

11

7

5

4

33

3 2 2 2

Malware

Testing

Comprehensive

DDoS

Testbeds

Classes

Infrastructure

Botnets

Overlays

Wireless

Traceback

Privacy

Spoofing

Spam

Multicast

Page 31: The DETER Project

31

Education on DETERhttp://www.isi.edu/deter/education

Air Force Research LabColorado State UniversityIIT DelhiJordan University of S&TLehigh UniversitySanta Monica College

• Special support for education projects– Recyclable student accounts, automated setup– Class hand-off– Special resource access control– Resource reservation

• Shared exercise materials• Education usage so far

Sao Paolo State UniversityUC BerkeleyUCLAUS ARMY School of ITUniversity of Nebraska - LincolnUniversity of Southern CaliforniaYoungstown State University

Page 32: The DETER Project

32

Talk Outline

• Long-term Vision: Advanced scientific instrument– Elevate the science of cybersecurity

• Platform: Advanced testbed technology– Robust, diverse, and scalable experiments

• Growing Community: Collaborative science– Effective and efficient sharing

• Next Steps: DETECT – Program to catalyze cybersecurity research

Page 33: The DETER Project

33

What is an experiment? New definition

• Events of interest• Background environment, domain-specific

– Virtual topology (varies with phenomenon), could be dynamic, abstract, expresses needs and constraints

– Cross-traffic, cross-events• Perhaps a defense• Scenario combining the above, domain-specific• Measurement tools, metrics of success, domain-

specific• Research goals, domain-specific• Invariants (truths that must hold), domain-specific• A user specifies ONLY details of interest• Experiment description separate from deployment

Page 34: The DETER Project

34

DETECT: DETER Next Generation

ElementsGoalsInvariants

Experiment Creation System

Abstract Elements Containers

Embedder

Federation System

Description

Federated Systems

MapElements into Containers

AssignContainers to

Distributed Resources

Interconnected Abstract Elements

• Increased testbed-wide expressiveness and control• Significantly expands the set of feasible & interesting

experiments

Page 35: The DETER Project

35

New Capabilities

ElementsGoalsInvariants

Experiment Creation System

Embedder

Federation System

Description

Federated Systems

MapElements into Containers

AssignContainers to

Distributed Resources

Interconnected Abstract Elements

New Style of Experiments

(AdvancedScientific Instrument)

New Abstractions(Advanced

Testbed Technology)

New Mapping Algorithms

(AdvancedTestbed Technology)

New Security & Control Algorithms

(AdvancedTestbed Technology)

New Domains

New

Sharing M

echanisms

New Resources(New Domains)

Page 36: The DETER Project

36

Advanced Scientific Instrument

• Experiment abstraction: Decrease barrier, increase efficiency

– Models– Recipes– Workbenches

• Invariants: Language for behavior– Refinement– Validity management– Risky experiment management

• Science of Repeatability

ElementsGoalsInvariants

Page 37: The DETER Project

37

Experiment Health System

Helps users understand their experiment’s behaviorGenerates, records and uses higher level knowledge about the experiment

– Desired invariants– Expected behavior

Takes corrective or notification action if invariant is violated

– Monitor invariants– Trigger actions

Captures invariants in exportable form for experiment reuse, repeatability and validation, etc.

Event Architecture

Diagnostics & Analytics

Services

ThirdEyeDiagnostics and Analysis Framework

for Testbed Experiments

Page 38: The DETER Project

38

Advanced Testbed Technologies

• Focus: Virtualization and abstraction• Components:

– Element = abstract representation of capability e.g., VM, SCADA simulation

– Container = physical resources for element realization e.g., emulation hardware, PC

• Flexible, multi-level abstractions beyond VMs

– Fine-grained control for advanced users

– Interfaces and extension mechanisms

– Mapping/embedding challenges

Map Elements into

Containers

Assign Containers to

Distributed Resources

Inter-connected Abstract Elements

Page 39: The DETER Project

39

New Specialization Domains

• Botnets– Modeling multiple infection vectors – Characterizing propagation models – Incorporating recent discoveries

• Critical Infrastructure– Simulation packages as modules – Visualization – Integration with vulnerability data

(S2TAR)• Wireless

– Integration with emulators – Wireless/wired risky experiments – Extend testbed with notions of

mobility

© im

pactlab.com©

geeksquad.com©

reset.jp

Page 40: The DETER Project

40

Community Development

• Content sharing support– Experiments, data, models, recipes– Class materials, recent research results, ideas

• Shared spaces – Outreach: Conferences, tutorials, presentations – Share and connect: Website, exchange server, social

networking tools – Common experiment description: Templates– Build community knowledge: domain-specific

communities• Education support

– NSF CCLI grant: develop hands-on exercises for classes– Capture-the-Flag exercises – Moodle server for classes on DETER

Page 41: The DETER Project

41

• Graduated, visual, and powerful experiments• Domain-specific (DDoS, worm, botnet) capabilities• Built-in sharing capabilities

Experiment Templates

ElementsGoalsInvariants

Page 42: The DETER Project

42

Enhanced Infrastructure

• Efficiency and scalability – Configuration management and

infrastructure protection– VLAN bandwidth (10Gbps) – VM models/archival capabilities

• High-performance co-processing – NetFPGA node deployment– Hardware modules

• Advanced O&M– Fault location and management– Integrate IPMI (Intelligent Platform

Monitor Interface) for early detection of problems

– Idleness detection and management

Page 43: The DETER Project

43

DETER Summary

DETER project develops scientific methods and infrastructure for advancing security in identified hard problems

• Six years of experience from multiple fronts– Operations– Research– Teaching

• Significantly improved safety, utility and usability of testbeds so far

• Exciting new developments planned, so stay tuned!

Page 44: The DETER Project

44

Thank you

We’d love to hear your questions and comments! Jelena [email protected] [email protected] project Web pagehttp://www.isi.edu/deterDETER testbed Web pagehttp://www.deterlab.net