Top Banner
1 UNCLASSIFIED UNCLASSIFIED APPROVED FOR PUBLIC RELEASE APPROVED FOR PUBLIC RELEASE Role of Middleware in Systems Functioning over Mobile Wireless Networks Secure Middleware for Robust and Efficient Interoperability over Disadvantaged Grids Dr. Ramesh Bharadwaj Center for High Assurance Computer Systems Naval Research Laboratory Washington DC 20375 USA Tel: +1-202-767-7210 Fax: +1-202-404-7942 Email: [email protected]
46

Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

Jul 04, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

1

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Role of Middleware in Systems Functioning over Mobile Wireless Networks

Secure Middleware for Robust and Efficient Interoperability over

Disadvantaged Grids

Dr. Ramesh BharadwajCenter for High Assurance Computer Systems

Naval Research LaboratoryWashington DC 20375 USA

Tel: +1-202-767-7210Fax: +1-202-404-7942

Email: [email protected]

Page 2: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

Report Documentation Page Form ApprovedOMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering andmaintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, ArlingtonVA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if itdoes not display a currently valid OMB control number.

1. REPORT DATE 01 DEC 2007

2. REPORT TYPE N/A

3. DATES COVERED

4. TITLE AND SUBTITLE Secure Middleware for Robust and Efficient Interoperability overDisadvantaged Grids

5a. CONTRACT NUMBER

5b. GRANT NUMBER

5c. PROGRAM ELEMENT NUMBER

6. AUTHOR(S) 5d. PROJECT NUMBER

5e. TASK NUMBER

5f. WORK UNIT NUMBER

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Center for High Assurance Computer Systems Naval ResearchLaboratory Washington DC 20375 USA

8. PERFORMING ORGANIZATIONREPORT NUMBER

9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)

11. SPONSOR/MONITOR’S REPORT NUMBER(S)

12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited.

13. SUPPLEMENTARY NOTES

14. ABSTRACT

15. SUBJECT TERMS

16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

UU

18. NUMBEROF PAGES

45

19a. NAME OFRESPONSIBLE PERSON

a. REPORT unclassified

b. ABSTRACT unclassified

c. THIS PAGE unclassified

Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Page 3: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

2

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

RoadmapRoadmap

1. Background and Motivation2. Our Solution3. Design Philosophy4. Case Studies5. Technical Approach6. Major Accomplishments7. Transition Plans

Page 4: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

3

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1.Background and Motivation2. Our Solution3. Design Philosophy4. Case Studies5. Technical Approach6. Major Accomplishments7. Transition Plans

Page 5: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

4

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

LANINTERNET

CPU VMSCPU UNIXCPU MVS

LANDIALOG

ORDER OF B

ATTLE

ORGANIZATION

C4IPHYSIC

AL

Information Ops Battle SpaceInformation Ops Battle Space

Requirements for the Navy’s Command and Information Infrastructure are flexibility, modular system design, fast and easy configuration, and information assurance.

-- Committee on Network-Centric Naval Forces

Requirements for the Navy’s Command and Information Infrastructure are flexibility, modular system design, fast and easy configuration, and information assurance.

-- Committee on Network-Centric Naval Forces

Network-Centric Warfare Demands a SecureSecure and and SurvivableSurvivable Information Grid

Page 6: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

5

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

The NavyThe Navy’’s Open Architecture:s Open Architecture: Requirements for InteroperabilityRequirements for Interoperability

“ [ The Open Architecture will … ] substantially reduce shipboard computer maintenance by capitalizing on the fact that application components are not bound to computer locality but instead are free to migrate to available processors under Resource Management (RM) control.”

Open Architecture Computing Environment (NSWC Dahlgren)

Infrastructure must provide:• Pool-of-computers architecture• Applications not bound to computer locality but migrate to available processors

• Functionally distinct self-contained applications or components

• Components loosely coupled in space and time

• Applications built for portability and location transparent allocation and operation

Page 7: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

6

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

How can we achieve this?How can we achieve this?

• autonomy (“autonomous agents”)• mobility (“mobile agents”)• learned behavior (“learning agents”)

• multiplicity (“multi-agent systems”)• distributed implementation• cooperation and coordination• “emergent” behavior

Software agents are computer programs with one or more of the following attributes:

Page 8: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

7

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

A Case for Distributed Agents: UAV Swarms

Page 9: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

8

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

A Case for Distributed Middleware: Intelligent Agent Security Module

Internet

OUTERROUTER

FIREWALL INNERROUTER

IDS (NetRanger)

IDS (Real

Secure)

HACKERHACKER

Solaris

Linux

HP/UX

Windows NTDomain

Windows 2000Domain

PRO

TEC

TED

EN

CLA

VE

INTELLIGENT AGENTSECURITY MODULE SUITE

!!!!!

• Real-time Intrusion Pattern Detection• Proactive Attack Identification• Cyberlab – Effectiveness Metrics

• Identify Attack Sources• Forensic Analysis and Data Mining• Correlation, Fusion, and Visualization

Page 10: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

9

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Threats to InteroperabilityThreats to Interoperability

“A Network Enabled Battlespace is dangerous if content is not secured and guaranteed. […] a major challenge is to ensure that data and communications, at rest and on the fly, are secure each time, every time.” -- Battlespace Information 2003

Interoperability goals: • reduce total ownership costs• quick and easy system upgrade

and reconfiguration• lower impact of COTS upgrades• reduce compatibility problems

• COTS flaws• Insiders• Nation States• Hackers• User mistakes• Trojan horses

THREATS

Page 11: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

10

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Information Assurance (IA)

“Information Operations That Protect and Defend Information and Information Systems

by Ensuring Their Availability, Integrity, Authentication, Confidentiality, and Non- repudiation. This Includes Providing for Restoration of Information Systems by

Incorporating Protection, Detection, and Reaction Capabilities.”

Joint Doctrine for Information OperationsJoint Pub 3-13, Oct 9, 1998

Page 12: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

11

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Trus

ted

App

licat

ions

IA Is An Enabler

• We Count on Information Superiority to Improve Combat Effectiveness– Full Spectrum Dominance– Network Centric Warfare

• IA Enables Information Superiority in a Network- Centric Paradigm– Global Secure, Interoperable

Network– State-of-the Art Protection for

Information Infrastructure

Naval TransformationPower Projection Precision Engagement

Focused Logistics Assured AccessNetwork Centric Warfare

Info Sharing Virtual CollaborationStreamlined Planning Better Awareness

Information SuperiorityDecision Superiority Knowledge Management

Uninterrupted Info Flow Integrated C4ISR

Information Assurance

Secu

re

Net

wor

ks

Dyn

amic

O

pera

tions

Trai

ned

Wor

kfor

ce

Page 13: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

12

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2.Our Solution3. Design Philosophy4. Case Studies5. Technical Approach6. Major Accomplishments7. Transition Plans

Page 14: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

13

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Solution: Solution: SecureSecure and and Reconfigurable MiddlewareReconfigurable Middleware

Distributed middleware researchers1 identify the following challenges:

Programming AbstractionsNaming and Resource DiscoveryAdaptive Data FusionAdaptive Distributed PlumbingFailure SemanticsRuntime MechanismsSystem Evaluation

… but miss the most important2 ones:TrustworthinessSecurityRobustnessSystem Survivability

1 RamachandranRamachandran U., et al., U., et al., 99thth IEEE Workshop on Future IEEE Workshop on Future Trends of Distributed Trends of Distributed Computing Systems, May 2003.Computing Systems, May 2003.

2 Bharadwaj R., 9Bharadwaj R., 9thth IEEE IEEE Workshop on Future Trends of Workshop on Future Trends of Distributed Computing Distributed Computing Systems, May 2003.Systems, May 2003.

Page 15: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

14

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Secure Infrastructure forSecure Infrastructure for Networked Systems (SINS)Networked Systems (SINS)

•• Uses software agents technologyUses software agents technology

•• Addresses security, performance, and robustnessAddresses security, performance, and robustness (survivability addressed in a related NRL 6.2 project)(survivability addressed in a related NRL 6.2 project)

•• Builds security into agent middlewareBuilds security into agent middleware

– Completeness and Consistency of Agent Behavior– Mechanical proofs of safety properties and agent compliance with

local security policies – Determination of emergent behavior of a community of agents

– Completeness and Consistency of Agent Behavior– Mechanical proofs of safety properties and agent compliance with

local security policies– Determination of emergent behavior of a community of agents

What can we prove about agents in the SINS architecture?What can we prove about agents in the SINS architecture?

Page 16: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

15

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

CRYPTO ASSISTCRYPTO ASSISTAGENTSAGENTS

POLICY ENFORCEMENTPOLICY ENFORCEMENTAGENTSAGENTS

MONITORINGMONITORINGAGENTSAGENTS

SECURITYSECURITY AGENTSAGENTS

AUTHORIZATIONAUTHORIZATIONAGENTSAGENTS

APPLICATIONAPPLICATION--SPECIFICSPECIFICAGENTSAGENTS

SAFETY PROPERTYSAFETY PROPERTYNever issue a CFF if forceCode == <friendly>

Security AgentsSecurity Agents Enforce Enforce a Consistent Security Policya Consistent Security Policy

•• intrusion detectionintrusion detection•• application monitoringapplication monitoring•• survivabilitysurvivability•• infrastructure monitoringinfrastructure monitoring

Security Agents act as mini-firewalls between an application and the OS resources.

Security Agents act as mini-firewalls between an application and the OS resources.

Page 17: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

16

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2. Our Solution3.Design Philosophy4. Case Studies5. Technical Approach6. Major Accomplishments7. Transition Plans

Page 18: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

17

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Design Tradeoffs

Security Agents enabled

application

Functionality

Secu

rity

and

Surv

ivab

ility

Usability and Efficiency

Distribution

Security and Survivability must be considered in the context of applications.

Security and Survivability must be considered in the context of applications.

Page 19: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

18

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Spatially distributed objectsSpatially distributed objects

Adaptive Coordination LayerAdaptive Coordination Layer

Based on a DualBased on a Dual--Layer ApproachLayer Approach

ServicesServices

References:References:•• Bharadwaj R, Bharadwaj R, ““SOL: A Verifiable Synchronous Language for Reactive Systems,SOL: A Verifiable Synchronous Language for Reactive Systems,”” In Proc. Synchronous In Proc. Synchronous Languages, Applications, and Programming (SLAPLanguages, Applications, and Programming (SLAP’’02), ETAPS 2002, 02), ETAPS 2002, GrenobleGrenoble, France, April 2002., France, April 2002.

•• Bharadwaj R, Bharadwaj R, FroscherFroscher J, J, KhashnobishKhashnobish A and Tracy J. A and Tracy J. ““An Infrastructure for Secure Interoperability of Agents,An Infrastructure for Secure Interoperability of Agents,”” in Proc. Sixth World in Proc. Sixth World MulticonferenceMulticonference on on SystemicsSystemics, Cybernetics and Informatics, Orlando, FL July 2002., Cybernetics and Informatics, Orlando, FL July 2002.

•• Bharadwaj R, Bharadwaj R, ““SINS: A Middleware for Autonomous Agents and Secure Code MobilitSINS: A Middleware for Autonomous Agents and Secure Code Mobility,y,”” In Proc. Second In Proc. Second International Workshop on Security of Mobile MultiInternational Workshop on Security of Mobile Multi--Agent Systems (SEMASAgent Systems (SEMAS--02), First International Joint 02), First International Joint Conference on Autonomous Agents and Conference on Autonomous Agents and MultiagentMultiagent Systems (AAMAS 2002), Bologna, Italy, July 2002.Systems (AAMAS 2002), Bologna, Italy, July 2002.

Page 20: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

19

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Distributed Objects Layer (DOL)Distributed Objects Layer (DOL)

Secure Operations Layer (SOL)Secure Operations Layer (SOL)

Secure Infrastructure for Networked Secure Infrastructure for Networked Systems (SINS)Systems (SINS)

ServicesServices

Domain Engineering: Identification and Design of SOL ComponentsDomain Engineering: Identification and Design of SOL Components•• Bharadwaj R. Bharadwaj R. ““Formal Analysis of Domain Models,Formal Analysis of Domain Models,”” in Proc. International Workshop on Requirements forin Proc. International Workshop on Requirements for

High Assurance Systems (RHASHigh Assurance Systems (RHAS’’02), Essen, Germany, September 2002.02), Essen, Germany, September 2002.

•• Kirby J. Kirby J. ““Rewriting Requirements for Design,Rewriting Requirements for Design,”” in Proc. IASTED International Conference on Softwarein Proc. IASTED International Conference on Software Engineering and Applications (SEA 2002), Cambridge MA, NovembEngineering and Applications (SEA 2002), Cambridge MA, November 2002.er 2002.

•• Bharadwaj R. Bharadwaj R. ““How to fake a Rational Design Process using the SCR Method,How to fake a Rational Design Process using the SCR Method,”” in Proc. Software Engineering in Proc. Software Engineering for High Assurance Systems (SEHAS 2003), held in conjunction for High Assurance Systems (SEHAS 2003), held in conjunction with the International Conference on Softwarewith the International Conference on Software Engineering (ICSE), Portland OR, May 2003.Engineering (ICSE), Portland OR, May 2003.

• Security• Naming• Discovery• Fault-Tolerance• Survivability• Timeliness

Infrastructure

Page 21: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

20

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Secure Agent Development Process

Secure Agent Requirements

Standard Decomposition

Agent Design

AgentImplementation

Agent Deployment

Page 22: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

21

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2. Our Solution3. Design Philosophy4.Case Studies5. Technical Approach6. Major Accomplishments7. Transition Plans

Page 23: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

22

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Case StudiesCase Studies

•• Integrated Marine MultiIntegrated Marine Multi--Agent Command and Control System Agent Command and Control System (IMMACCS):(IMMACCS): AgentAgent--based C2 systembased C2 system

•• RealReal--time Execution Decision Support (REDS):time Execution Decision Support (REDS): Decision Support System Decision Support System which uses agents for information access and disseminationwhich uses agents for information access and dissemination

Current agent-based systems cannot guarantee:• Integrity: System safety and information assurance are not considered• Performance: The distributed object model is inefficient• Robustness : Agents are brittle, hard to create, deploy, and debug

Next-Generation agent-based Command and Control Systems:

Page 24: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

23

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

if if Radar.forceCodeRadar.forceCode == <not friendly> == <not friendly> &&&& Radar.status == ACTIVERadar.status == ACTIVE

thenthen CallForFire.targetCallForFire.target = name (Radar)= name (Radar) CallForFire.controlMethodCallForFire.controlMethod = WHEN READY= WHEN READY

endifendif

SADLSADLIntegrity factors• information leaks• user mistakes• malicious attacks

Safety PropertyNever issue a Call For Fire if forceCode == <friendly>

Safety PropertySafety PropertyNever issue a Call For Fire if forceCode == <friendly>

Domain BDomain A

InformationFlow

Agent at Agent at Domain A

……………………ObjectivesObjectives

ISR AssetsISR Assets

……………………ObjectivesObjectives

ISR AssetsISR Assets ISRISR OpsOps

XX

Case Study:Case Study: IMMACCS System Integrity

Page 25: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

24

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Performance factors• replication of data• bandwidth of links• reliability of links

Domain BDomain A

InformationFlow ……………………

ObjectivesObjectives

ISR AssetsISR Assets

……………………ObjectivesObjectives

ISR AssetsISR Assets ISRISR OpsOps

LAN

LAN

Distributed Objects

Case Study:Case Study: IMMACCS Performance

Page 26: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

25

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Evaluating agent behaviorCompleteness and consistency of emergent agent behavior

Evaluating agent behaviorEvaluating agent behaviorCompleteness and consistency of emergent agent behavior

Domain BDomain A

InformationFlow

Agent1Agent1

……………………ObjectivesObjectives

ISR AssetsISR Assets

……………………ObjectivesObjectives

ISR AssetsISR Assets ISRISR OpsOps

Agent2Agent2

if Munitions.CEP <if Munitions.CEP < Munitions.ECRMunitions.ECR

then ratings = ratings then ratings = ratings -- 55

if Munitions.ECR < if Munitions.ECR < TargetSizeTargetSize then ratings = ratings then ratings = ratings -- 1010

if Munitions.CEP >if Munitions.CEP > Munitions.ECRMunitions.ECR

then ratings = ratings then ratings = ratings -- 1010

Agent3Agent3

<< Robustness factors• compositionality• code safety• modularity• dynamic reconfigurability

SADLSADL

SADLSADL

SADLSADL

Case Study:Case Study: IMMACCS Robustness

Page 27: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

26

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2. Our Solution3. Design Philosophy4. Case Studies5.Technical Approach6. Major Accomplishments7. Transition Plans

Page 28: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

27

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

SYSTEM INTEGRITY– Authentication and

authorization

–– Confidentiality and Confidentiality and integrity of integrity of transmitted transmitted informationinformation

–– Security Protocols for Security Protocols for fast/easy configurationfast/easy configuration

–– Safety and Security Safety and Security Policy EnforcementPolicy Enforcement

PERFORMANCE– Dynamically

determined agent routing patterns

– Flexible event handling and propagation

– Highly-efficient transmission of relevant information

ROBUSTNESS– Secure

Operations Language (SOL)

– Agent Creation Framework

– Assurance of agent behavior

ThreeThree--Pronged ApproachPronged Approach

Page 29: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

28

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Decrypt Agent

Decrypt Agent

Decrypt Agent

Decrypt Agent

Decrypt Agent

Authenticate Agent Authorize Agent (Source Analysis)

Enforce Policy

Proposed SINS Architecture

Local Security PolicyLocal Security Policy1. Disk Access Allowed1. Disk Access Allowed2. Not to exceed 5 MB2. Not to exceed 5 MB

Public Key Infrastructure/Public Key Infrastructure/ Trust ManagementTrust Management

MOPEDMOPED (Model checker for SPKI/SDSI)(Model checker for SPKI/SDSI)

Security Policy Definition Security Policy Definition LanguageLanguage

Schneider Schneider AutomataAutomata

Page 30: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

29

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

if Munitions.ECR < if Munitions.ECR < TargetSizeTargetSize

then ratings = ratings then ratings = ratings -- 1010

if Munitions.CEP <if Munitions.CEP < Munitions.ECRMunitions.ECR

then ratings = ratings then ratings = ratings -- 55

if Munitions.CEP if Munitions.CEP << Munitions.ECRMunitions.ECR

then ratings = ratings then ratings = ratings -- 1010

Salsa: NRL Patented TheoremSalsa: NRL Patented Theorem Proving TechnologyProving Technology

module module intel_agentintel_agent

functionsfunctions target_size = 20;target_size = 20;

type definitionstype definitions ratings : integer range [ratings : integer range [--20,100];20,100];

monitored variablesmonitored variables CEP, ECR : integer;CEP, ECR : integer;

controlled variablescontrolled variables rating: ratings;rating: ratings;

definitionsdefinitions varvar rating initially 100 :=rating initially 100 := ifif [] ECR < target_size [] ECR < target_size --> rating > rating --1010 [] CEP < ECR [] CEP < ECR --> rating > rating --55 [] CEP < ECR [] CEP < ECR --> rating > rating --1010 fifi

end module // end module // intel_agentintel_agent

TNTTNT

Inconsistency!!Inconsistency!!

Checking Consistency of Emergent Checking Consistency of Emergent Agent BehaviorAgent Behavior

Page 31: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

30

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Salsa: An Automatic Invariant Checker

Parser

Agent description

TermRewriter

Formula Reducer

VerificationCondition Generator

DisjointnessDisjointnessCoverageCoverage

Application Properties

UNSATISFIABILITY CHECKERUNSATISFIABILITY CHECKER

booleanenumerated

types integers

description is valid

description invalid+

counterexample

Salsa contains 30,000+ lines of source code (previous ONR 6.2 work)

The UNSATISFIABILITY CHECKERintegrates two important decisionprocedures: a BDD algorithm andan integer linear constraint solver.

Page 32: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

31

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2. Our Solution3. Design Philosophy4. Case Studies5. Technical Approach6.Major Accomplishments7. Transition Plans

Page 33: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

32

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

[Bha02] Bharadwaj R. “Verifiable Middleware for Secure Agent Interoperability,” In Proc. Second Goddard IEEE Workshop on Formal Approaches to Agent- Based Systems (FAABS II), October 2002.

[Bha03a] Bharadwaj R. “A Framework for the Formal Analysis of Multi-Agent Systems,” In Proc. Formal Approaches to Multi-Agent Systems (FAMAS) affiliated with the European Joint Conferences on Theory and Practice of Software (ETAPS 2003), Warsaw Poland, April 2003.

[Bha03b] Bharadwaj R. “Secure Middleware for Situation-Aware Naval C2 and Combat Systems,” in Proc. 9th International IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), San Juan PR, May 2003.

[KIB03] Kim S, In P, and Bharadwaj R. “An Extended Framework for the Validation and Verification of Situation-Aware Middleware Architectures,” In Proc. Ground Systems Architectures Workshop (GSAW), Manhattan Beach CA, March 2003.

[TB03] Tressler E, and Bharadwaj R. “Inter-Agent Protocol for Distributed SOL Processing,” NRL Memorandum Report, In Preparation.

Additional Publications

Page 34: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

33

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. SOL (Secure Operations Language)– Design and implementation of SOL compiler for

distributed agent implementation over SSL (Secure Sockets Layer) network connections [Bha03b, KIB03].

– Development of techniques to ensure that SOL agents are composable, consistent, safe, secure, and verifiable. References [Bha02] and [Bha03a] provide details.

2. Agent monitoring and coordination– Design of Inter-Agent Protocol (designated the Agent

Control Protocol, or ACP) and a secondary protocol (Module Transfer Protocol, or MCP) for inter-agent communication and distributed agent deployment [TB03].

3. Determining emergent properties of multi-agent systems– Implementation of translators SOL2SAL and SAL2SOL as

interim solution for using formal verification tool Salsa (implemented in previously funded ONR 6.2 project).

FY 2003 Milestones

Page 35: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

34

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Overall Project Milestones

FY03 FY04 FY05•

Secure Operations Language (SOL) - Making SOL composable, consistent, safe, secure, verifiable - Formal proofs of application properties o o

S Secure Infrastructure for Networked Systems (SINS) - Prototype Implementation- Requirements Elicitation and Design o - Demonstration System o

Agent monitoring and coordination - Monitoring architecture over physically distributed domains- Selecting security protocols to enforce/maintain consistency o- Establishing the consistency of agent behavior and data- Establishing that agents enforce a consistent security policy - Obtaining a situational awareness picture for agents

Security Agents: - Establishing trust in security agents

Development of application-specific security agents: - Intrusion detection - Survivability and adaptability

Key:Milestone

o Ongoing Activity

Key:Milestone

o Ongoing Activity

Page 36: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

35

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

WOCWOC

JFACCJFACC

GFCCGFCC

JFCJFC

TargetTargetSystemsSystems

……………………ObjectivesObjectives

ISR ISR AssetsAssets

LogisticsLogisticsOpsOps

ISRISR

……………………ObjectivesObjectives

ISR AssetsISR Assets

……………………ObjectivesObjectives

ISR AssetsISR Assets

……………………ObjectivesObjectives

ISR AssetsISR Assets

Operational Payoff: Secure and Efficient C2 for Combat Systems

Page 37: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

36

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Releasepolicyserver

Sanitize information Flow

controller

Receivepolicyserver

Enforce flow direction

Enforce authentication,

integrity, labeling, …, policy

Security agents make decisions

Enforce organization or application-specific release policy

optional process (e.g., remove source, fuzz

image)

Security agents make decisions

Domain A Domain B

Security Agents ensure securedissemination of information across domains

Security AgentsSecurity Agents ensure securedissemination of information across domains

MultiMulti--Security Levels:Security Levels: One Role for Security AgentsOne Role for Security Agents

Page 38: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

37

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

1. Background and Motivation2. Our Solution3. Design Philosophy4. Case Studies5. Technical Approach6. Major Accomplishments7.Transition Plans

Page 39: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

38

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Transition Opportunities

•• NavyNavy’’s Open Architecture Computing Environments Open Architecture Computing Environment–– AegisAegis--equipped cruisers and destroyersequipped cruisers and destroyers–– SSDSSSDS--equipped carriers and large deck equipped carriers and large deck amphibsamphibs–– SubmarinesSubmarines–– DD(X) land attack destroyerDD(X) land attack destroyer–– Littoral Combat Ship (LCS)Littoral Combat Ship (LCS)

•• UAV SwarmsUAV Swarms•• Distributed Sensor NetworksDistributed Sensor Networks

Page 40: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

39

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Open Architecture Characteristics

Designers have identified the following requirements:• Portability• Location transparency• Loosely coupled components

– Time and space

• Preservation of data integrity across threads, processes, computers, networks

NRL Secure Agents Middleware will provide these characteristics.NRL Secure Agents Middleware will provide these characteristics.

Page 41: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

40

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Open Architecture Challenges Addressed by SINS

We have identified the following additional challenges:• Security

– Malicious users– Malicious code– Confidentiality

• Impact of COTS upgrades on applications– Immature standards– 30 year lifetime– Vendor-specific changes

• Difficulty of finding (COTS) middleware talent• Complexity of (COTS) middleware

How to design applications with the desired characteristics?How to design applications with the desired characteristics?

Page 42: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

41

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Agents for UAV Swarms

Page 43: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

42

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Sensor Networks

Sensor Grid

C2 Systems

Enemy Ship,troop, aircraftMovements

Chemical Agent Detection

SITUATIONALAWARENESS

Sensor networks collect and transfer information critical to provide a complete,

accurate and trusted situational awareness picture

Sensor networks collect and transfer information critical to provide a complete,

accurate and trusted situational awareness picture

If this information cannot be trusted,

it cannot be utilized

If this information cannot be trusted,

it cannot be utilized

Sensor networks are thus critical components

Their security is critical!

Page 44: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

43

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Sensor Network Characteristics

Mote (tiny, wireless) Sensor

Sensor Attributes• Power Constrained• Limited Memory• Limited Processor Capability• Expendable

Sensor Attributes• Power Constrained• Limited Memory• Limited Processor Capability• Expendable

Communication Capabilities• Wireless Interface• Limited Bandwidth• Limited Range

Communication Capabilities• Wireless Interface• Limited Bandwidth• Limited Range

Networking• Ad Hoc• Self-Organizing• Randomly Failing Nodes• Dynamic Routing

Networking• Ad Hoc• Self-Organizing• Randomly Failing Nodes• Dynamic Routing

Sensor Network

Denial of Service (e.g., Jamming)Compromise (Sensor, Network)

Injection of False DataSpoofing

Security Threats

Page 45: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

44

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

Project ObjectivesEnsure secure, efficient, and robust distributed system interoperability.

Additionally, reduce total ownership costs, allow quick and easy system

upgrade and reconfiguration, lower the impact of COTS upgrades, and reduce

compatibility problems.

Secure Middleware For Distributed Applications

Project Description & Technical Approach

Design and advanced prototype development of secure distributed middleware for efficient, reconfigurable, and scalable system interoperability, using the novel concept of “security agents,” i.e., mini-firewalls, to ensure system integrity, efficiency and robustness. Target applications are information network situational awareness, networked C2 for combat applications, the Open Architecture, and Unmanned Aerial Vehicle (UAV) swarms.

Project Payoff/Impact on Naval Needs

• Networked systems that are provably secure and intrusion tolerant

• Networked systems that are flexible, reconfigurable, and survivable

• New ways of tackling complexity, the Achilles heel of system vulnerabilities

• Introduces a novel notion of security agents – software that polices malevolent foreign code

Project Start/Milestones/Funding

Task 3: Application- Specific Security Agent Development

FY 03 FY04 FY05

Task 4: Monitoring, Coordination, and Experimentation

Task 1: Secure Operations Language

Task 2: Secure Infrastructure for Networked Systems

$600K $600K $600K

Page 46: Secure Middleware for Robust and Efficient ... › dtic › tr › fulltext › u2 › a485243.pdf · •• Addresses security, performance, and robustnessAddresses security, performance,

45

UNCLASSIFIED UNCLASSIFIED –– APPROVED FOR PUBLIC RELEASEAPPROVED FOR PUBLIC RELEASE

ENDEND