Public networks such as the Internet are commonly used to allow businesses and consumers to access and share information from a variety of sources. However, security is often a concern when accessing the Internet. Particularly for businesses, which often allow Internet conductivity to their private corporate networks (“corpnets”), there is a threat of malicious software being downloaded from a website which may contain viruses, Trojan horses, or other malicious executable code (collectively referred to as “malware”) that may infect computers inside the private network. To prevent such infections, network administrators often employ “anti-X” technologies (where “X” is typically used to denote “virus,” “spyware,” “malware,” etc.) at the enterprise level.
While anti-X technologies may perform satisfactorily in some settings, they generally cannot cope with data that is arbitrarily tunneled, obfuscated, or hidden by steganographic techniques that are intended to conceal the data within other files and which often may appear to the user to be legitimate and/or harmless. For example, some malware code can be obfuscated, or passed in source form and compiled by the user according to social engineering instructions from a malicious attacker where user interaction with the code executes the attack.
Detecting each and every piece of steganographic data at an edge device, such as a firewall deployed at the perimeter of the corpnet, is theoretically impossible. In addition, with mobile computing and storage devices connecting in and out of the corpnet, even if perfect edge protection were available, it would not apply when a PC (personal computer) or other device is connected to a less secure network outside of the protected perimeter of the corpnet. However, when at some later stage a security compromise does occur and is detected within the network perimeter (for example by an anti-virus agent running on the desktop), it would be desirable to know exactly which weaknesses in the protection software and/or users' interactions and behaviors led to the compromise in order to prevent similar compromises from occurring in the future.
This Background is provided to introduce a brief context for the Summary and Detailed Description that follow. This Background is not intended to be an aid in determining the scope of the claimed subject matter nor be viewed as limiting the claimed subject matter to implementations that solve any or all of the disadvantages or problems presented above.
An automated security feedback arrangement is provided by which a specialized audit record called a tainting record is linked to data crossing the perimeter of a corpnet that comes from potentially untrusted sources. The linked tainting record operates to taint such data which may be received from external sources such as e-mail and websites or which may comprise data that is imported into the corpnet from mobile computing devices such as laptop computers, mobile phones, and portable mass storage devices. Data that is derived from the original data is also tainted using a linked tainting record which includes a pointer back to the previous tainting record. The linking and pointing back are repeated for all subsequent derivations of data to thus create an audit trail that may be tracked and used to reconstruct the chain of events between the original data crossing the corpnet perimeter and any security compromise such as a virus or other malware infecting a workstation that may later be detected in the corpnet.
Enterprise-wide collection of chains of events for all security compromises may be performed using, for example either a centralized or virtual audit server, to discover common patterns of user behavior which lead to such compromises and may be used as feedback to improve security in the corpnet. Such feedback may be automated in the form of alerts to the corpnet perimeter that may be used to block certain traffic or to establish edge protection rule sets. The feedback may also be used as an educational tool to present back to the users the chains of events leading to security compromises, and expose repetitive negligent user behaviors, to teach and inform the users of better security practices.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Like reference numerals indicate like elements in the drawings. Elements are not drawn to scale unless otherwise indicated.
A plurality of workstations 1221, 2 . . . N such as PCs, laptops, and other host devices will typically be deployed in the corpnet 105. Each workstation 122 will generally be configured with a desktop agent, as representatively indicated by reference numeral 126 which provides anti-X capabilities. These capabilities may be supplemented or, in some cases, replaced by security functionalities that may be provided by various types of security products 131 that may be present in the corpnet 105. Such security products may include, for example, a host-protection security product, network intrusion detection system (“NIDS”), a network access protection (“NAP”) security product, security event management/security incident management security products (“SEM”/“SIM”), and the like.
An edge firewall 136 is positioned at the network perimeter 140 of the corpnet 105 which protects the corpnet 105 from Internet-based threats. Typically, the firewall 136 will monitor inbound and outbound traffic between the Internet 115 and the corpnet 105. Firewall security is often enforced through filtering according to a rule set or other policies. Filtering can be performed on a packet basis at the network and transport layers of the seven-layer OSI (Open System Interconnection) model, using stateful filtering where information about a TCP (Transport Control Protocol) session is utilized to determine if a packet is allowed or denied, or using application-layer filtering in which intelligent filtering is performed based on packet contents. In some implementations, the edge firewall 136 may be embodied, for example, as a Microsoft Internet Security and Acceleration® (“ISA”) server that incorporates in-memory and disk-based caching functionality to improve the speed at which web data is served to the workstations 122. Mobile devices 143 are also supported in the present computing environment 100. Such devices 143 are commonly used by enterprise users while they are away from the physical corpnet 105 when, for example, working from home or while away on travel. A variety of different types of mobile devices may be used in a given implementation as representatively illustrated by a laptop computer 1431, a smart phone 1432, and portable storage media 143N which include, for example, optical discs, and mass storage devices such as portable hard disk drives and flash-based devices like USB (Universal Serial Bus) flash devices.
A user may connect a mobile device 143 to resources from the external untrusted sources 112 via the Internet 115 when the user and the device are outside the corpnet 105. The user may then bring the mobile device 143 inside the perimeter 140 of the network 105 which presents another pathway for potential malware to be introduced into the corpnet 105 as indicated by arrow 145. While the edge firewall 136 may often provide very satisfactory results in minimizing the introduction of Internet-based threats into the corpnet 105, it is noted that even perfect edge protection would not normally be applicable to this pathway that the mobile devices 143 enable to the corpnet.
A centralized audit server 147 is also deployed in the corpnet 105. In addition to providing conventional auditing functions, the centralized audit server 147 is utilized here to collect and record chains of events on an enterprise-wide basis in the corpnet 105, as described in more detail below in the text accompanying
In alternative implementations, the features and functionalities provided by the centralized audit server 147 may be provided using a virtual audit server 152 that is distributed among the other platforms in the corpnet 105. In this case, a thin software layer is typically run on each workstation 122 which presents an abstraction of virtual machines to the other workstations to enable the auditing functionality to be virtualized. In addition, the virtualization enables the software on a given workstation to be strongly isolated. Software on one virtual machine cannot see or affect another virtual machine unless explicitly permitted by the virtual audit server 152. This virtualization feature provides a measure of resilience against malware tampering with the audit data.
A directory server 158 is also utilized in the corpnet 105. The directory server 158 provides support to manage user identities including, for example, authentication and authorization services for the users working at the local workstations 122. Other business systems 161, including accounting systems for example, may also be commonly deployed in the corpnet 105.
Turning now to
Each subsequent tainting record 2022 . . . N that follows the original tainting record 2021 includes a pointer 2101 . . . N that points back to the previous tainting record. The linking of the tainting records to derived data and the pointing back to the previous tainting record may thus create an audit trail that is tracked by the audit server 147 and used to reconstruct a chain of events between the original data 2051 crossing the corpnet perimeter 140 and any security compromise 217 such as a virus or other malware infecting a workstation 122 that may be later detected in the corpnet 105. The security compromise 217 in the corpnet 105 may be detected, for example by a desktop agent 126 or by a security product 131 operating in the corpnet.
Derived data may include data that is generally related to the original data. The original data may also function as a container for the derived data, or otherwise tunnel, hide, or obfuscate the derived data. And, it is possible for additional data to be successively derived from derived data so that there can sometimes be many links in a chain of events from the original data crossing the network perimeter 140 that lead to a security compromise in the corpnet 105. Several examples of derived data are given below in the illustrative examples shown in
As indicated by reference numeral 223 in
The e-mail 3301 in this example includes machine-unreadable instructions on how the archive may be decrypted: “To defend from virus infection in transit, the archive is encrypted for your protection and security. Use the first four letters of the English alphabet in lowercase to extract it.” Such instructions are an example of social engineering techniques which are used to trick users into performing actions or providing information in order to further a malicious purpose.
When the user decrypts the ZIP file, the extracted file 3302 (named dancing.pigs.jpeg.exe) is tainted as well by an attached tainting record 3022. The tainting record 3022 includes a pointer 310 back to the previous tainting record 3021 which is linked to the incoming e-mail 3301.
When the user later runs the exe file 3302 on the workstation 122, in this example, the workstation becomes infected by a virus named NakedPig.S. The infection is detected by the desktop agent 126 as indicated by reference numeral 341. But, by tainting the incoming data crossing the corpnet perimeter 140, as well as tainting the data that is derived from it, the audit server 147 can track all the data it needs to be able to reconstruct the chain of events between the security compromise on the workstation 122 and the incoming e-mail 330.
The website 4301 is tainted by linking a tainting record 4021 to it. The clipboard contents (i.e., the VBS code) are also tainted using a linked tainting record 4022 which includes a pointer 4101 back to the previous tainting record that is linked to the website 4301.
The user then follows the social engineering instructions provided by the website to save the VBS code in a file 4303 named HomegrownPIG.VBS using the Notepad.exe utility running on the workstation 122. This file 4303 is also tainted by a linked tainting record 4023 which includes a pointer 4102 back to the previous tainting record 4022. When the user later runs the VBS file 4303 on the workstation 122, in this example, the edge firewall 136 detects the malicious outbound traffic which results, as indicated by reference numeral 441. As with the illustrative example described in the text accompanying
As noted above, the chains of events that are collected across an enterprise may be used to feed security information back to other components of the corpnet 105 and to its users to improve security policies. In some cases, the chain of events may be collected in anonymized form to protect users' privacy. As shown in
The automated processes 513 may include, for example, alerts 606 that are generated by the audit server 147 in an automated manner and sent to either the edge firewall 136 or an edge firewall administrator 611, as shown in
The manual processes 518 may involve presenting a reconstructed chain of events back to users whose actions and behaviors caused the security compromise. Such presentations can be expected to incentivize users to learn and employ more effective security practices. These may include, for example, refusing to provide the required manual operations associated with social engineering and trojans, and maintaining their workstations with the current security patches and updates.
In some cases the feedback 702 will be sent only to the offending user 706. In other cases, for example, those involving security compromises which result in significant losses or costs being borne by the enterprise, or where the user 706 engages in repeated negligent behavior, the feedback may also be sent to supervisory personnel 708 and 711, as representatively indicated by the dashed lines in
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.