A network security policy enforcement system for workstation security parameters monitoring and network vulnerability assessment.
The present invention pertains to computer network security and network vulnerability assessment. A new security inspection agent along with a central controller including one-time password, compression and encryption and featuring small footprint and high security technique is disclosed. Monitoring of security and configuration parameters in an IP network and autonomously triggering of pre-defined events upon deviation of the said parameters from standard values is considered in this invention. The system presented here allows for detection of security flaws that would remain undetected in conventional systems.
Nowadays, intrusion detection within IP networks is commonly achieved by the mean of aggressive filtering techniques that can detect possible security threats. These filtering techniques usually rely on the signature of already known network attacks or misuses for successful signature analysis or pattern matching algorithms applied to network data packets. Filtering is done at the packet level whereby each IP packet that enters the network is carefully analyzed. This approach requires the system to maintain an up-to-date database of the attacks' signatures. Due to memory scarcity the system may drop packets or shutdown computational intensive analyses. Furthermore, as the size of a network expands, this technique prohibitively burdens the network. Even worse, this technique may lead to a complete network breakdown if the processing power of the filtering engine is not judiciously chosen to cope with the increase of network traffic.
Another approach commonly implemented consists in deploying intelligent security agents in the machines present in the network. The agents reside in the machines and each agent operates only on the machine it resides in. Besides security parameter monitoring, the agents can also perform a preset given task. The intelligent agent reports the status of the monitored machine at regular intervals to the central controller. The frequency of the reports, the communication mode between the agent and the controller, etc., can be set to meet the constraints of a given network. This approach significantly reduces the network load created by the network security system. However, while reducing the traffic flow, infrequent communication between the agents and the controller degrades the overall system performance. The major drawback of this approach is the fact that the very agents can be manipulated from within the network and hence, can be easily turned into a dangerous weapon against the network by a malicious user.
In order to solve this problem, the present invention introduces dumb agents. Dumb agents are carefully designed software programs that run on the nodes of the network. Using dumb agents significantly reduces the risk of security events triggered from within the network.
Thus, in a first aspect of the invention, there is provided network enforcement security system comprising:
Another aspect of the invention concerns A method for securely communicating between a central location and at least one client station, comprising the steps of:
In order to be effective, it is submitted that a modern security system should implement the following tree elements.
Central controller: This may comprise firewall, anti-virus, IP filtering, network attack signature mapping and IDS functionality.
One-time-password: Prevents automatic password cracking.
Inspection client: Located in every machine. Detects breach in the first defence system and gives warning to the central controller.
This three pillar approach allows addressing network security issues in an efficient manner. Consequently, countermeasures can be tailored to withstand the attacks depending on their origin and their gravity.
Thus, the present invention concerns broadly a network security monitoring and vulnerability assessment system wherein dumb agents are used to detect any changes in the configuration of the terminal hard disk or memory. This information is transmitted to a centralized network profile analyzer that compares the configuration reported by the clients against a profile table that is constantly updated and containing all the pertinent information. The client is dumb in the sense that it can execute only a very restricted set of commands. This prevents the client from being manipulated by a malicious user from within the network. Moreover, the communication between the agent and the controller is encrypted and authenticated through the one-time password. The key aspect of this invention is a compression system that significantly alleviates the network load while maintaining a real-time communication between client and controller.
The agents essentially report the configuration of the node they are running on to the central controller. This report may consist of all the executables, the devices and the corresponding device drivers as well as the physical parameters of the system. In order to prevent manipulation of the client by malicious users, the central controller maintains a signature list of the clients currently active in the network. Further the client is carefully designed to execute only a very restricted set of commands that comprises regular echoes and system information disclosure. Any request that deviates from these commands is automatically filed as a possible security threat. The dumb client sends its information in a compressed and sequenced manner. A small footprint is achieved by extensive use of elliptic cryptography.
The central controller uses the agents spread over the network to obtain network information. The central controller analyzes the information provided by the software agents and decisions are taken based on some parameters provided by the system administrator. The central controller triggers the start and end of a report and consequently specifies the type of report a given client should perform.
The use of one-time password provides protection against passive communication eavesdropping and replay attacks when the communication between the client and the server is monitored by an attacker and information gained in this way is then used to impersonate the legitimate user. Message confidentiality and privacy is enforced by the means of encryption and digital data signature.
The compression system allows for significant reduction of the network bandwidth allocated to the security management mechanism and hence allows more bandwidth to be dedicated to user and system application.
One embodiment of the present invention represents an inventory system. In the said configuration, several agents are distributed in the networked item to be inventoried. Regular polling of the agents by the central controller determines the presence or absence of an item. This can be used in public access computer network such as schools or educational institution to prevent theft of peripherals such as keyboards, monitors or printers.
The information sent by the client is compressed and digitally signed using appropriate algorithms such as RSA or ECC. However, in this context, ECC based signatures should be preferred since they significantly help meeting the requirement of small foot print targeted by the invention presented here. Actually, the signature generated by the client strongly depends on both the static password provided by the user and the one-time password generated by the client and stored in the memory of a smart card or an RFID token that the user possesses.
In the event of inconsistencies between the information received from the client and the reference values stored in an appropriated database, the controller triggers an alert mechanism that informs the network administrator on the gravity of the problems encountered and the possible solutions. The alert information may be of visual or audible nature or a combination of both. Further, the information collected across the network is used to create and maintain a network vulnerability map that identifies and categorizes security deficiencies within the network. Such a map is extremely useful for the administrative staff in regard of security related future investments.
On the contrary of traditional systems, it is peculiar to the invention presented here that the client is not empowered to take action on the terminal side upon security event. Consequently, decision taking is completely deferred to the controller. In other words the client does not detect the problems. The client merely gathers pertinent information on the host and sends this information to the central controller. This subtle difference is essential to the system presented here since it prevents malicious users from manipulating the client.
In the inventory system configuration, several agents are distributed in the networked item to be inventoried. Regular polling of the agents by the central controller determines the presence or absence of an item hence triggering an alarm if required. This can be used in public access computer network such as schools or educational institution to prevent theft of peripherals such as keyboards, monitors or printers.
In both cases, the one-time password can subsequently be used to secure subsequent communications between the client and the central controller as depicted in
This represents to the inventors' knowledge the first approach for a consistent implementation of a battery-less one-time password system. Actually, the set of one-time passwords computed by the client or the server can be either based on Elliptic Curves or on the RSA scheme or on any other pseudo random function. However, RSA-based one-time passwords will hardly meet the requirement of small foot print.
As depicted in
This mechanism can be used in conjunction with casino chips or other types of gaming tokens for the purpose of token authentication. In this special embodiment, the first approach should be preferred since its only requires the RFID tag to posse memory for data storage.
Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter or change the nature and scope of the present invention.
Number | Date | Country | Kind |
---|---|---|---|
2,471,055 | Jun 2004 | CA | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CA2005/000949 | 6/16/2005 | WO | 00 | 10/31/2007 |