The present invention is generally related to the security, performance, reputation, and integrity of the internet and the cloud. More specifically, this invention relates to a system, method, and apparatus for detecting compromise of DNS servers, IP devices, paths, email, real-time and historical information all of which make-up the internet portion of cloud hosting. The present invention may be used to fight vulnerabilities of data, applications, devices, and other assets in the cloud and the internet.
The evolution of deploying applications, servers, and assets has gone from a mainframe environment to a client/server environment to an internet environment and now to the cloud. This has been driven by the economics of a return-on-investment that has been gained by sharing applications, infrastructure and internet. And the gradual shift of what were strategic applications such as sales force automation to being a commodity. These commodity applications are necessary but do not need to be proprietary.
IT professionals and business personnel have elected to use the cloud to host their applications and access them through the internet. For example, salesforce.com may be hosted on a cloud offered by Amazon. Quickbooks.com can be accessed in a cloud environment as opposed to multiple, redundant and/or expensive data centers.
This cloud market is estimated at $50B and growing at 20% annually. However, this eclectic set of technologies comprised in the cloud and internet access has led to massive vulnerabilities in management and security.
For example known vulnerabilities have been reported in the literature:
Locking Down the Cloud: Why DNS Security Must Be Improved (InformationWeek, Sep. 27, 2008)
http://www.informationweek.com/news/internet/security/showArticle.jhtml?articleID=210603893
For example:
Cyber attacks knock out Georgia's Internet presence (Computerworld, Aug. 11, 2008)
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9112201
The reputation database embodiment of this invention will address this type of vulnerability.
For example:
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority (College of Computing, Georgia Institute of Technology; College of Engineering, Georgia Institute of Technology)
The correlation embodiment of this invention will address this type of vulnerability.
http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=208803842
http://www.citi.umich.edu/u/provos/papers/ndss08_dns.pdf
The DNS database within the internet is a rising attack vector. A perpetrator can change a corporations customer's DNS resolver settings very easily and the results can be devastating for both the customer and the online resource they are accessing. Most importantly, all communication, email and web, can be redirected to malicious sources.
Drive-by alterations of DNS data host files is a looming threat. The Google/GA Tech study points to the growing threat associated with individual computers being directed to use rogue DNS services instead of those natural DNS servers provided by their network. This of course is different from traditional DNS attacks, such as poisoning, because the individual user's computer is targeted, instead of servers. . . . “since (these attacks) involve only the victim and a complicit remote server, the attack is difficult to witness outside of the local network.”
For example:
Vast Spy System Loots Computers in 103 Countries (New York Times, Mar. 29, 2009)
http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&scp=1&sq=Vast%20Spy%20System%20Loots%20Computers%20in%20103%20Countries&st=cse
Computer based software (malware) clandestinely steals unknowing users data, “ . . . infiltrating at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices.” “The spy operation is still going strong and continues to invade and monitor more than a dozen new computers a week.” “The malware is remarkable both for its sweep—in computer jargon, it has not been merely “phishing” for random consumers' information, but “whaling” for particular important targets”
It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.” “What Chinese spooks did in 2008, Russian crooks will do in 2010 and even low-budget criminals from less developed countries will follow in due course,” the Cambridge researchers, Shishir Nagaraja and Ross Anderson, wrote in their report, “The Snooping Dragon: Social Malware Surveillance of the Tibetan Movement.”
The IP validation embodiment of this invention specifically addresses this vulnerability.
For example:
“A high-tech tip, an old-school stakeout in Craigslist attacks” The Boston Globe, Apr. 23, 2009.
http://www.boston.com/news/local/massachusetts/articles/2009/04/23/a_high_tech_tip_an_old_school_stakeout/
“A computer identification code known as an IP address was the first clue to draw police to the luxury towers in Quincy, where Markoff lived in a $1,400-a-month one-bedroom apartment.” This invention would go much further using not only the IP address, but also the entire environment including network paths, log files, location information, telephone records to not only identify the computer involved but the user, location, access history, other sites visited/targets and correspondence as well.
The Who Sent embodiment of this invention will specifically address this vulnerability.
One embodiment of the present invention is a method for giving situational awareness and alerting on the following conditions:
FIG. 2—illustrates the IP device parameters that may be used to authenticate a device.
FIG. 3—depicting example data populating the reputation database.
FIG. 4—depicts an example alert notification of a compromise that has occurred with an accounting application and the automatic actions taken.
FIG. 5—depicts an example of the relationship between the applications and observed risks, the larger the circle the higher the risk.
FIG. 6—depicts an example of mitigation and reports sent compromise in an accounting application.
FIG. 7—depicts an example of threshold risk analysis of an intrusion.
FIG. 8—depicts an example dashboard for contextualized situational awareness.
FIG. 9—depicts a risk analysis of compounded event such as change in reputation data involving email blacklisting and paths.
FIG. 10—depicts an example risk analysis of data center breach correlating physical intrusion detection, log file changes, DNS changes, etc.
FIG. 11—example of mitigation alerting to a security breach and physical configuration of a facility.
FIG. 12—example of an escalation of alert for a security breach whereby if no response to mitigation takes place an orderly notification of other possible mitigation mechanisms takes place.
FIG. 13—example of a presentation layer on an Apple iPhone device.
FIG. 14—example of an automatic, customizable, forensic analysis of alerted situation.
FIG. 15—example of existing data detailing internet view of domain and internet accessible assets.
FIG. 16—example of three-tier implementation architecture for analysis/correlation, Who Sent, alert engine, IP authentication and reputation database components.
FIG. 17—example of set theoretical view of the forensic analysis.
The present invention provides a system, a method, and an apparatus for situational awareness of many aspects of the internet, networks and cloud infrastructure.
“Food Chain” associated with the Cloud:
User (e.g. Chief Financial Officer)
Applications provider (e.g. Salesforce.com, QuickBooks)
Cloud Hosting (e.g. Amazon)
Supporting Software (e.g. DNSstuff, IBM Tivoli, HP Openview)
Hardware Vendors (e.g. HP, IBM, EMC, etc.)
Chips (e.g. Intel, Qualcomm, AMD)
“Cloud”—from the viewpoint of the user it is a general utility that handles all his/her applications, software and hardware needs. He/She may be charged by the transaction.
“Applications Providers”—from the viewpoint of the application provider the cloud is a deployment utility for efficiently providing their application to a large number of users.
“Hosting” from the viewpoint of the hosting provider is a collection of servers, mainframes, storage units, the internet, all of the hardware and software to host multiple applications
“Hardware/Software vendors” form the point of view the cloud is a new and changing market for hardware, software and consulting services, as cloud adoption grows need for self-fielded equipment will decline and need for hardware for the cloud service providers will increase.
“DNS (Domain Name System)” is one of the largest databases in the world consisting of all the pathways to devices and assets in the internet.
As used herein, the term “meta-data” shall designate data about data. Examples of meta-data include primitive events, (including changes in DNS, network paths, IP device identification), compound events, meta-data extracted from independent tips, network events, device information, and external information provided by government and law enforcement and other consortium. Meta-data also includes compound events and correlated events, defined below. Meta-data also includes information added manually by a human reviewer, such as a person who reviews tips and reports.
“BGP (Border Gateway Protocol)” is one expression of the current optimal routes on the internet.
“Primitive events” may be generated automatically by various devices, or may be generated in software based on data from various databases.
In one embodiment, a human operator adds meta-data and thereby generates primitive events. For example, a human operator may add meta-data indicating, “suspicious activity was observed at this location which houses servers.”
As used herein, “correlated events” shall include primitive and/or compound events that have been correlated across either data servers, space or time. An example of a correlated event is a change to DNS email settings correlated to a change in listing on blacklists and a change in network paths.
As used herein, the term “attribute data shall designate data about IP devices or sources (such as DNS data), such as the quality of the data produced by the IP devices, the age of the IP devices or data, time since the IP devices or data were last maintained, integrity of the IP devices or data, reliability of the IP devices or data, and so on. Attribute data has associated weights.
In the case of tips, attribute data refers to data about the source of the tips. For example, a tip from an anonymous submitter will have different weights corresponding to the attribute data than a tip submitted by a law enforcement officer.
Contextual attribute data is stored with the reputation data, and corresponds to the attribute data of the device that captured the data. For example, the meta-data is stored with access to the same context of the data.
“Meta-data” (primitive events, compound events, correlated events, etc.) and attribute data are used throughout the present invention. Meta-data in the form of primitive events is used to detect compound events of higher value. Primitive and compound events are correlated across space and time to generate additional meta-data of even higher value. The events are weighted according to the attribute data corresponding to the devices that generated the events. Primitive, compound, and correlated events may trigger one or more intelligent alerts to one or more destinations. The meta-data is also used for forensic analysis to search and retrieve data by event.
Meta-data and attribute data are both used for event correlation, for network management, and detection of vulnerabilities.
Finally, the analysis of a set of correlated events may lead to “resetting” (flip flop) of the entire decision tree that led to the alert.
One embodiment of the present invention is a system, a method, and an apparatus for data surveillance, vulnerabilities detection and alerting in a cloud environment.
One embodiment of the invention, Who Sent (115), reputation (112), analysis (111) captures its data and information from all sources of
The alert engine (113) is triggered by the analysis (111) engine. The escalation engine (114) has dynamic and customizable rules activated by all data sources. The management tools (110) are traditional tools that produce independent reports on performance, etc and provide data to the analytics engine (111) for situational awareness.
Determine who messages really came from, the path taken, the reputation of all the servers through which it passed and in depth analysis of the content, including links, in the message itself (
The Who Sent engine will look at each of these data points and use the historic data in combination with real-time analysis from the reputation database, external sources (
Device fingerprinting will implant a unique identifier (
We call this Contextual Meta-data. For example, this data includes characteristics of IP devices, networks connecting to other networks and routers and utilization of network based services, such as DNS, to enable them communicate. The context of each device (Contextual Meta-data) can be observed and memorialized over time.
The combination of device meta-data fingerprinting and Contextual Meta-data awareness exponentially increase the ability to identify and authenticate IP devices and can be used in spoofing and other intrusions.
The reputation database (
For example:
One router “should” have a “natural” path to another router. If this is not the case now or has not been over time, the analysis engine (
It should be noted that taken alone the data may not be compelling . . . taken in context the data and the information from all sources in
One embodiment of the present invention allows real-time alerts to be issued based on the present and historical situational DNS data (
In addition to alerting on the occurrence of primitive or compound events, the present invention may also alert based on an accumulated value of multiple events across space and time. Equations 1 to 3 show possible rules that may be evaluated by the correlation process. For example, as shown in Eq. 1, action component a, will be activated if the expression on the left-hand side is greater than a predetermined threshold, T1. In Eqs. 1-3, “a” stands for an action, “w” stands for attribute weights, “x” stands for non-DNS events, and “d” stands for DNS events. Eqs. 1-3 could represent a hierarchy of actions that would be activated for different threshold scenarios. Eqs. 1-3 are illustrative of only one embodiment of the present invention, and the present invention may be implemented using other equations, other expressions.
Equation 4 shows an example of a calculation for determining weights. The weights “wi” may be a weighted average of attribute data (ai), including resolution of the situational DNS data (R, “Src_AW_Quality”), age of the data used to capture the situational DNS data (A, “Src_AW_Age”), time since last instance of the situational DNS data (TM, “Src_AW_Currency”), and reliability of the source of the situational DNS data (RS, “Src_AW_Reliability”). Note that a similar expression can be used to calculate the importance (Y) of data by the IP authentication module when determining when to validate a device. Other weighting factors may also be used, and the weighing factors described here are illustrative only and are not intended to limit the scope of the invention.
In equation 4, ωk are relative weights of the attributes (ak), which are themselves weights associated with the data sources. The preceding equations are illustrative of but one manner in which the present invention may be implemented and are not intended to limit the scope to only these expression(s).
Reputation data may be cascaded down the decision tree based on its importance (Y). The data may also be cascaded upward to “reset”. The importance (Y) may be calculated as a weighted average of the attributes of the reputation data (including attributes of the device used to capture the reputation data). Examples of attributes of the reputation data include, but are not limited to, the following:
The data depicted in
IP
Entities
Devices
Networks
Entity Detail
DNS
Path History
Device History
Intrusion
Black Lists
Performance
As well as data from all sources in
Importance of the reputation data (Y) is used to cascade the reputation data, and may be calculated as a weighted average, as shown in Equation A.
where Y=importance of the data, ai=attributes of the data (Σ ai=1), wi=relative weights of the attributes (Σ wi=1), and N=total number of attributes.
If t0≦Y≦1 then data is stored in highest (first) hierarchy.
If t1≦Y≦t0 to then data is stored in second hierarchy.
If t2≦Y≦t1 then data is stored in third hierarchy.
. . .
If 0≦Y≦tn, then data is stored in lowest (last) hierarchy, where 1>t0>t1>t2> . . . >tn>0
For example, in a case of six attributes each weighted equally, the importance Y may be calculated as shown in Equation B:
Y=(L+R+A+RS+TM+TS)/6 (B)
Forensic analysis and event correlation across both space and time may be performed using the database schemas described here according to the principles of the present invention. The events, both primitive and compound, that are recorded in the Entities (
For example, suppose an event was recorded in the Entities and EntityDetail tables during detection of a change in a particular device. If at a later time it were desired to locate all places in the data where a that change was detected, a database query would be performed on these tables to retrieve all events where device changes were noted. The pointers to the data and the indices into the data would provide a mechanism by which to retrieve the data that corresponds to those occurrences of changes.
Each set of data Di has a corresponding set of meta-data Mi associated with it. Each element in the set of meta-data Mi has an index, or a pointer, to a corresponding portion of the data Di. For example, meta-data set M1, shown as element 17b in
In addition, sets Wi of attribute weight data are weight vectors associated with each set of meta-data Mi for device i (not shown). The sets Wi of attribute weight data are sets of vectors Wi,j which represent weights associated with subsets of the meta-data Wi. For example, weight vector Wi,j represented as element 17m, represents the weights associated with meta-data subset 17j. The weight vectors Wi,j may be n-dimensional vectors representing the weights in one of a number of dimensions, each dimension representing a weight in a particular attribute of the data. For example, a 2-dimensional weight [w11, w12] vector may represent the attribute weights associated with the reliability of a particular device for both reliability as well as change detection reliability. One device may have reliability and low change detection reliability, while another device may have high change detection reliability and low reliability. In principle, the attribute weight vectors wij may be arbitrarily fine-grained with respect to subsets of the meta-data and subsets of the data. In practice, attribute weight vectors wij are constant over large subsets of the meta-data and the data, and may have large discontinuities between subsets. For example, change detection may have a very low reliability weight, and very high change detection reliability, and vice versa for typical devices.
The set-theoretic described has been shown and described here for ease of understanding and explanation of the present invention. The meta-data and data may or may not be stored as sets; the data may be stored in matrices, tables, relational databases, etc. The set description is shown for clarity only. The present invention is not limited to this particular mathematical representation, and one of ordinary skill will recognize numerous alternative and equivalent mathematical representations of the present invention.
A possible query to retrieve those events in which a person was detected would be:
SELECT*FROM EVENTS WHERE MDParameterID=10 (1)
Query (1) would retrieve all events where a device was detected. In the set-theoretic notation described above, the query (1) would correspond to:
∀xj∈Vi|Mi,j(MDParameterID=10) (2)
In order to view the data corresponding to a particular event, a possible follow-on query would be:
VIEW EVENT 1 (3)
Similar queries could be used to retrieve other events. For example, in order to retrieve all reliability events, a possible query would be:
SELECT*FORM EVENTS WHERE MDParameterID=12 (4)
Query (4) would be represented in set-theoretic notation as:
∀xj∈Vi|Mi,j(MDParameterID=12) (5)
To view the first 3 events where reliability change was detected, a possible query would be:
VIEW EVENT1,2,3 (6)
Another possible query, to search for all data where a device change was detected, a possible query would be:
SELECT*FROM EVENTS WHERE MDParameterID=11 (7)
Query (7) would be represented in set-theoretic notation as:
∀xj∈Vi|Mi,j(MDParameterID=11) (8)
Similarly, in order to view the data corresponding to the first two events where a device change was detected, a possible query would be:
VIEW EVENT1,2 (9)
Event searches may be restricted by particular locations or date-ranges. For example, an analyst may only wish to search a particular device, or location, where change was detected, for example:
SELECT*FROM EVENTS WHERE MDParameterID=6 AND SrcID=1 (10)
Query (10) would be represented in set-theoretic notation by restricting the search to Di (data from device 1) as follows:
∀xj∈Vi|Mi,j(MDParameterID=6) (11)
The security analyst may also restrict searches by date and/or time. For example, the security analyst may only wish to search a particular date range where motion was detected, for example:
SELECT*FROM EVENTS WHERE MDParameterID=6 AND MD_Event-DateTime>=09/26/2007 (12)
Query (12) may be represented in set-theoretic notation as:
∀xj∈Vi|{Mi,j(MDParameterID=6) ∩ Mi,j(MD_Event_DateTime≧(09-26-2007)) (13)
Multiple events may also be searched. For example, an analyst may want to search historical data for all occurrences where a certain network event was detected. A possible query to accomplish this would be:
SELECT*FROM EVENTS WHERE MDParameterID=10 OR MDParameterID=16 (14)
Query (14) may be represented in set theoretic notation as:
∀xj∈Di|{Mi,i(MDParameterID=10)∩ Mi,i(MDParameterID=16) (15)
Any number of combinations and sub-combinations of events may be searched using the query language, including unions and intersections (conjunctions and disjunctions) of events using AND/OR operators, as well as other logical operators.
Events may also be correlated and analyzed across multiple devices, or multiple locations. For example, a analyst may want to see all events where change was detected in a particular network, or a data stream was detected in at a certain device. To perform such a search, the security analyst could search by:
SELECT*FROM EVENTS WHERE (MDParameterID=6 AND SrcID=1) OR (MDParameterID=15 AND SrcID=2) (16)
Query (16) may be interpreted in set-theoretic notation as:
∀xjD1 ∩ D3|{Mi,j(MDParameterID=6) ∩ M2,j(MDParameterID=15) (17)
The analyst is not required to use a query language. A query language may be used for sophisticated searches. For more basic searches, a user interface is provided for the analyst, which allows the analyst to select the meta-data criteria by which to search by using a visual tool. The user interface automatically generates the query language and queries the database for retrieval.
A possible structured query language was shown here. However, the present invention is not limited to the query language shown or described here. Any number of query languages are within the scope of the present invention, including SQL, IBM BS 12, HQL, EJB-QL, Datalog, etc. The query languages described here is not meant to be an exhaustive list, and are listed here for illustrative purposes only.
When performing queries on meta-data, such as unions and intersections, attribute weights may be recalculated. For example, to recalculate the attribute weights for an intersection of two subsets of meta-data, the attribute weights would be multiplied together, as shown:
W(M1 ∩ M2)=W(M1)·W(M2) (18)
For example, to calculate the weight associated with two events occurring substantially simultaneously, where the first event has a reliability of 90% (0.90), and the second event has a probability of 50% (0.50), the weight associated with both motion events substantially simultaneously is 45% (0.45).
To recalculate the attribute weights for a union of two subsets of meta-data, the law of addition of probabilities would be applied, as shown:
W(M1 ∩ M2)=W(Mi)+W(M2)−W(M1)·W(M2) (19)
For example, to calculate the weight associated with either one of two events occurring substantially simultaneously, where the first event has a reliability of 90% (0.90), and the second event has a probability of 50% (0.50), the weight associated with either one of the events occurring substantially simultaneously is 95% (0.95).
One embodiment of the present invention allows real-time alerts to be issued based on the present and historical data, and especially the present and historical vulnerability events. In one embodiment of the present invention, the correlation process correlates vulnerability events, both present and historical, across multiple IP devices and multiple locations, and activates via the alert/action engine one or more actions in response to the correlation exceeding a particular threshold. As previously described, the correlation process may evaluate various rules, such as “issue an alert to a given destination when a given vulnerability/situation is detected in a given device class/scenario during a designated time.” Security vulnerability detectors are used to detect vulnerability events in the IP devices, which are then input into the correlation process. Input may also come from other systems, such as logs, real-time path analysis, round-trip-time, time to live, accessibility, FBI files, police records, blacklists. Various actions may be taken under certain conditions, and may be activated by the alert/action engine when a certain set of conditions are met.
In addition to alerting on the occurrence of primitive or compound events, the present invention may also alert based on an accumulated value of multiple events across space and time. Equations 1 to 3 show possible rules that may be evaluated by the correlation engine. For example, as shown in Eq. 1, action component a1 will be activated if the expression on the left-hand side is greater than a predetermined threshold, T1. In Eqs. 1-3, “a” stands for an action, “w” stands for attribute weights, “x” stands for one class of vulnerability events, and “v” stands for another class of vulnerability events. Eqs. 1-3 could represent a hierarchy of actions that would be activated for different threshold scenarios. Eqs. 1-3 are illustrative of only one embodiment of the present invention, and the present invention may be implemented using other equations and other expressions.
See examples in BACKGROUND OF INVENTION. Each one of these intrusions can be mitigated with the inventions presented here.