Download Application of CYBEX (Cybersecurity Information Exchange)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cyberattack wikipedia , lookup

Security-focused operating system wikipedia , lookup

Information security wikipedia , lookup

Social engineering (security) wikipedia , lookup

Mobile security wikipedia , lookup

International cybercrime wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Transcript
SG17 Tutorial
Geneva
15 Dec 2010
V1.1
Application of CYBEX (Cybersecurity Information
Exchange) techniques to future networks
Tony Rutkowski
Yaana Technologies
Georgia Tech
Q.4/17 Rapporteur
CYBEX Basics
The new cybersecurity paradigm
know your weaknesses
minimize the vulnerabilities
know your attacks
share the heuristics within trust communities
CYBEX – techniques for the new paradigm
Weakness, vulnerability and state
Event, incident, and heuristics
Information exchange policy
Identification, discovery, and query
Identity assurance
Exchange protocols
X.1500 culminates a broadly supported 2-year effort
Consists of a non-prescriptive, extensible, complementary
“collection of tools” that can be used as needed
2
Today’s Reality
“security by design” is not a reasonable objective
today, as the code/systems are too complex,
distributed, autonomous and constantly changing
Common global protocol platforms for the
trusted exchange of information are essential
A distributed, “security management” network
plane that supports autonomy is emerging
Single “national centres” for this purpose are not
feasible and would represent a massive vulnerability
3
CYBEX Facilitates a Global Cybersecurity Model
Measures
for
protection
Measures for
threat
detection
Provide
basis for
additional
actions
Measures
for threat
response
Provide
basis for
actions
Forensics &
heuristics
analysis
Reputation
sanctions
Patch
development
Real-time data
availability
Provide
data for
analysis
Blacklists
&
whitelists
Vulnerability
notices
Stored event
data
availability
Identity
Management
Encryption/
VPNs esp. for
signalling
Resilient
infrastructure
Routing &
resource
constraints
Deny
resources
Provide
awareness of
vulnerabilities
and remedies
Network/
application
state &
integrity
CYBEX
Information Exchange
Techniques
4
The CYBEX Model
Cybersecurity
Entities
Cybersecurity
Information
acquisition
(out of scope)
 structuring cybersecurity information for
exchange purposes
 identifying and discovering cybersecurity
information and entities
 establishment of trust and policy
agreement between exchanging entities
 requesting and responding with
cybersecurity information
 assuring the integrity of the cybersecurity
information exchange
Cybersecurity
Entities
Cybersecurity
Information
use
(out of scope)
5
CYBEX Technique Clusters: Structured Information
Event/Incident/Heuristics
Exchange
Weakness, Vulnerability/State Exchange
Knowledge Base
Platforms
Weaknesses
Vulnerabilities
and
Exposures
Event
Expressions
Malware
Patterns
State
Security
State
Measurement
Configuration
Checklists
Incident
and
Attack
Patterns
Assessment
Results
Exchange Policies Exchange
Terms and
conditions
Malicious
Behavior
CYBEX Technique Clusters: Utilities
Identification, Discovery, Query
Common
Namespaces
Discovery
enabling
mechanisms
Identity Assurance
Trusted
Platforms
Authentication
Assurance
Methods
Authentication
Assurance
Levels
Request
and
distribution
mechanisms
Exchange Protocol
Trusted
Network
Connect
Interaction
Security
Transport
Security
Today’s Use Cases
Your computer
Patch Tuesday
Open Windows Update
X.1500 Appendices
NICT CYBEX Ontology
Japan’s JVN
USA Federal Desktop Core Configuration/
US Government Configuration Baseline
8
Significant adoption rate
SG17 December 2010 Geneva Cybersecurity Workshop
Session 5.1
Robert A. Martin of MITRE described the essentials for Vendor Neutral
Security Measurement & Management with Standards
Ian Bryant of the EU NEISAS Project described the challenges in
sharing security information for infrastructure protection
Takeshi Takahashi of NICT described an ontological approach for
cybersecurity information haring, especially for Cloud Computing
Thomas Millar of the US-CERT presented an operational model of CIRT
processes for improved collaboration and capability development
Luc Dandurand of NATO described his organizations new initiative for
cyber defence data exchange and collaboration infrastructure (CDXI)
Damir Rajnovic of FIRST described the structure and mechanisms of
the principal global organization of cybersecurity incident centers
IETF October 2010 Beijing Meeting
CYBEX conceptualized as a security management layer
9
Toward Network Security Planes:
Security Automation Schemas Everywhere
XCCDF
OVAL
eXensible
Configuration
Checklist
Description
Format
CVSS
Open
Vulnerability
and
Assessment
Language
Common
Vulnerability
Scoring
System
CWSS
Common
Weakness
Scoring
System
SCAP
Security
Automation
Tools
CPE
Common
Platform
Enumeration
CCE
Common
Configuration
Enumeration
ARF
Assessment
Result Format
CVE
Common
Vulnerabilities
and
Exposures
CWE
Common
Weakness
Enumeration
10
What about Future Networks/NGNs?
A potential implementation of a CYBEX reference model
for NGNs is depicted in the following diagrams
SCAP should be ubiquitous in the models
This approach is adapted from a similar approach already
being taken for NGN Identity Management
NGN providers would play a substantial CYBEX
framework-support function with understood assurance
levels among themselves and all network devices and
capabilities within their domain
Under this approach, CYBEX techniques would be
adapted as necessary through the use of extensions and
reflected in a new extensible Y-series Recommendation
ETSI TISPAN is already working on a similar model
11
CYBEX applied to Future Network Strata
Scope of CYBEX
Management Plane
Control Plane
User Plane
NGN Service Stratum
Management Plane
Control Plane
User Plane
NGN Transport Stratum
Figure 2/Y.2011
12
CYBEX applied to Future Network Functions
Scope of CYBEX
Figure 3/Y.2011
Infrastructural, application,
middleware and baseware services
Services
Transport Management
Functions
Transport Control
Functions
Resources
Service Control
Functions
Resources
Service Management
Functions
Transfer Functional
Area
13
CYBEX applied to Future Network Models
toward a NGN/FN security plane
CYBEX
Exchange on
UNI Interfaces
CYBEX
Exchange on
UNI Interfaces
CYBEX Exchange
on NNI Interfaces
NGN Provider A
CYEX
Functions
Service
Control
CYBEX
Functions
Transport
Stratum
Application
Support
Management Functions
Application
Support
CYBEX
Functions
Service
Control
Cybex
Functions
Transport
Stratum
CYBEX
Functions
End User
Functions
End User
Functions
Management Functions
CYBEX
Functions
NGN Provider B
14