Top Banner
Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna , Dr. Peter Reiher, Dr. Leonard Kleinrock, Dr. Gerald Popek Laboratory for Advanced Systems Research UCLA Computer Science Annual Computer Security Applications Conference 2003
19

Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Securing Nomads:The Case For Quarantine,

Examination, Decontamination

Kevin Eustice, Shane Markstrum, V. Ramakrishna,

Dr. Peter Reiher, Dr. Leonard Kleinrock, Dr. Gerald PopekLaboratory for Advanced Systems Research

UCLA Computer Science

Annual Computer Security Applications Conference 2003

Page 2: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

In a Nutshell

• Problem summary– Networks do little to monitor or control entry– Exploited or vulnerable nomadic devices freely

move around– Other devices may victimize or fall victim to these

devices

• A proposed model: QED– Quarantine devices upon entrance– Examine devices as required by environment– Decontaminate devices to repair or update

Introduction – Challenges – The Paradigm – Conclusion

Page 3: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

New Trends In Nomadicity

Users:• Frequently change networks, taking their devices

with them• Carry misconfigured and vulnerable software with

them from locale to locale• Pick up electronic hitchhikers (viruses, malicious

agents, other malcode) from other nomads they encounter

Introduction – Challenges – The Paradigm – Conclusion

Page 5: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Bob’s Office

Scenario: nomadic blaster

propagation

Worker

Worker

Worker

Worker

Bob

Page 6: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Traditional Security Ignores Nomadic Devices

• Wireless focus has been on better– Authentication– Encryption

• Wired and wireless devices promiscuously enter and leave networks– Little accountability in existing paradigm– Reactive security, not proactive

Introduction – Challenges – The Paradigm – Conclusion

Page 7: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Life will only get worse…

• Pervasive Computing is coming• Pervasive paradigm implies many more

attack vectors and potential attackers• Abundant confidential and important

personal information• Some possibilities:

– Trojan horses in consumer electronics– PDA-carried viruses– Wireless parasites

Introduction – Challenges – The Paradigm – Conclusion

Page 8: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Characteristics of the Environment

• Many, many affected users and devices• Heterogeneous OS/application space• Dynamic, often short-lived network

membership• Mostly benevolent but non-technical users• Minimal system administration available

Where do we go from here?

Introduction – Challenges – The Paradigm – Conclusion

Page 9: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Bob’s Office

QED

Bob

Worker

Worker

Worker

Worker

Quarantine device upon entry into network, and authenticate.

Examine device for vulnerabilities or undesirable services.

Decontaminate: Work with device to repair vulnerabilities!

Page 10: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

QuarantineTypically, there are two immediate

types of desired quarantine:

• Isolation from outside world– Many networks partially do this– Often imperfectly

• Isolation from peers– Few networks do this– Just as important

Introduction – Challenges – The Paradigm – Conclusion

Page 11: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Quarantine

Some mechanisms to quarantine devices include:

• Routing restrictions at gateway• Voluntary isolation by device• DENY firewall rules on peers• MAC address-based forwarding restrictions

in Access Point• Quarantine wireless network outside

firewall

Introduction – Challenges – The Paradigm – Conclusion

Page 12: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

ExaminationMany possible alternatives:

• Software package analysis• Network profiling• Configuration analysis• File checksum examination• Virus scan

Introduction – Challenges – The Paradigm – Conclusion

Page 13: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

DecontaminationAssist device in complying with local

policy:

• Work with device to fix problems• Update software packages, configurations• Ask device to disable certain services

while in this network, etc.

Introduction – Challenges – The Paradigm – Conclusion

Page 14: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Work in Progress:QED Prototype

Introduction – Challenges – The Paradigm – Conclusion

Page 16: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Open Issues

• Overhead management• Privacy• Leveraging trust relationships• Heterogeneity

Introduction – Challenges – The Paradigm – Conclusion

Page 17: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Big Picture

• QED is a component of Panoply, UCLA’s pervasive computing project

• We think QED is a step towards more secure pervasive environments

Introduction – Challenges – The Paradigm – Conclusion

Page 18: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

Conclusions

• Existing security mechanisms are insufficient for emerging pervasive computing paradigm

• Security needs to be proactive• QED is the first system to address

these issues

Introduction – Challenges – The Paradigm – Conclusion

Page 19: Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,

References

For more info:

Contact: [email protected]

• Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald Popek, Venkatraman Ramakrishna, Peter Reiher . “Enabling Secure Ubiquitous Interactions ”. In the proceedings of the 1st International Workshop on Middleware for Pervasive and Ad-Hoc Computing.

• Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald Popek, Venkatraman Ramakrishna, Peter Reiher . “Wi-Fi Nomads: The Case for Quarantine, Examination and Decontamination ”. To appear in the proceedings of the New Security Paradigms Workshop 2003.