engineering in cyber resiliency: a pragmatic*...

38
Engineering in Cyber Resiliency: A Pragmatic* Approach Bill Sanders Donald Biggar Willett Professor of Engineering Head, Department of Electrical and Computer Engineering 1 * but not perfect

Upload: others

Post on 09-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

Engineering in Cyber Resiliency: A

Pragmatic* Approach

Bill SandersDonald Biggar Willett Professor of Engineering

Head, Department of Electrical and Computer Engineering

1

* but not perfect

Page 2: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Being Pragmatic:

Separating Science Fantasy from Science Fact

"If there’s one disadvantage to spending more than a quarter of a century in security, it’s that you become hypersensitized to mangled terminology and fantasy passed off as current science”

David Harley, Senior Research Fellow, ESET

The Challenge 2

Said when speaking about The Florentine Deception by Carey Nachenberg.

Page 3: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Cyber Security Facts (according to Sanders)

The Challenge 3

• Cyber systems are complex, and their complexity will only

continue to increase.

• Absolute cyber security is unattainable.

• Cyber systems intended to be trustworthy must operate

through attacks.

• Protect the best you can, but realize that perfect protection is

impossible, so resiliency can only be achieved through

tolerating attacks through online detection and response.

• Assessment of the “amount” of security that a particular

resiliency approach provides is essential.

• Perfect cyber security is science fantasy, and perfection is

the enemy of good.

Page 4: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

THE CRITICAL NEED: Provide Assured Trustworthy System Operation

in Hostile Environments

• Be Trustworthy

– A system which does what is supposed to do, and nothing else

– Availability, Security, Safety, …

• Tolerate a Hostile Environment

– Accidental Failures, Design Flaws, and Malicious Attacks

• Consider the cyber, physical, and social system aspects

• Provide Assurance through Assessment

– Provide justification that the system will operated as expected

– Choose among design alternatives to achieve greater trustworthiness.

The Challenge 4

Page 5: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Engineering in Resiliency: Trust Specification,

Design, Implementation, and Validation

Architecture

Requirement

Specification

Design

Assessment

The Challenge 5

Page 6: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Engineering in Resiliency:

Design and Architecture

Design for Resiliency 6

Page 7: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Resiliency Design Challenges

Intrusion Response System

Monitor 1

. . .

Monitor n

Action 1

. . .

Action m

Alerts Monitoring info

Commands

Possible effects of each action? Cost of each action?

Monitor output meaning? Confidence level in alerts?

How secure is the system in its current state?

Design for Resiliency 7

Page 8: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

OFFLINE/ONLINE

COMPUTATION

Diverse SystemMonitoring

Monitor Fusion

Response Selection and

Actuation

ONLINE COMPUTATION

Notional Architecture for Resiliency

Design for Resiliency

Monitor Placement

RESILIENCY

INFRASTRUCTURE

Secure Monitoring and

Response Infrastructure

8

Page 9: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

Diverse SystemMonitoring

Monitor Fusion

Response Selection and

Actuation

ONLINE COMPUTATION

Design for Resiliency

Monitor Placement

RESILIENCY

INFRASTRUCTURE

Secure Monitoring and

Response Infrastructure

The monitor placement algorithm deploys sensors according to specified monitoring goals

The system model represents the services, possible responses, attacker characteristics, and architecture of a system.

OFFLINE/ONLINE

COMPUTATION

9

Notional Architecture for Resiliency

Page 10: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

Diverse SystemMonitoring

Monitor Fusion

Response Selection and

Actuation

ONLINE COMPUTATION

Design for Resiliency

Monitor Placement

RESILIENCY

INFRASTRUCTURE

Secure Monitoring and

Response Infrastructure

The sensor inputs, alerts, and logs feed into a different set of fusion and correlation algorithms to generate a higher-level alert

OFFLINE/ONLINE

COMPUTATION

10

Notional Architecture for Resiliency

Page 11: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

Diverse SystemMonitoring

Monitor Fusion

Response Selection and

Actuation

ONLINE COMPUTATION

Design for Resiliency

Monitor Placement

RESILIENCY

INFRASTRUCTURE

Secure Monitoring and

Response Infrastructure

The decision algorithm decides on learning responses to intensify and focus the monitoring resources, and/or effect a response strategy, e.g.

• Block an attacker• Move a target• Reallocate services• Recover services

OFFLINE/ONLINE

COMPUTATION

11

Notional Architecture for Resiliency

Page 12: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

Diverse SystemMonitoring

Monitor Fusion

Response Selection and

Actuation

ONLINE COMPUTATION

Design for Resiliency

Monitor Placement

RESILIENCY

INFRASTRUCTURE

SecureMonitoring and

Response InfrastructureThe monitoring and response

architecture provides a trustworthy infrastructure on which to implement resiliency services and maintain a trustworthy world view.

OFFLINE/ONLINE

COMPUTATION

12

Notional Architecture for Resiliency

Page 13: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Challenges in Providing Cyber Resiliency

• Adaptation inherently increases the attack surface of a

system

• Monitoring is increasingly possible, but creates a data

deluge that makes difficult to identify relevant attack

indicators

• Monitors are corruptible, which makes knowledge about

the cyber state of the system only partially trustworthy

• A world model is needed to reason about indicators, but

this reasoning is fallible if an attacker can work outside the

model

• Catastrophic failures are (hopefully) rare, but can have a

huge impact. Predictions based on historical data are

notoriously bad at coping with rare events.The Challenge 13

Page 14: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Example 1: E-commerce System with Accidental Failures (SRDS

‘05, DSN ’06, IEEE Trans Dep/Sec ’11 with AT&T Research)

Design for Resiliency

HostC

Oracle

DB

HostB

Web

Server 2App Server 2

HostAWeb

Server 1App Server 150%

50%

50%

50%

HTTP1

Path

Monitor

DB

Monitor

HTTP2

Path

Monitor

WS2

Monitor

WS1

Monitor

AS1

Monitor

AS2

Monitor

• Fault models: fail-silent (crash), non fail-silent (zombie) faults• Recovery Actions: restart component, reboot host. • Individual component monitors: only detect crashes• End-to-end path monitors: detect crashes and zombies but poor localization• Recovery Cost: fraction of “lost” requests (i.e. user-perceived availability)

14

Page 15: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Recovery Engine

Restart

Reboot

Restart

Recovery Engine Architecture

Engine Operation

• Action that maximizes value function tree is chosen at each step• What to use for remaining cost at the leaves of the tree?

– Zero cost, heuristic cost, bound?

(p)

New

Belief

State

Bayesian

Update

Monitor

Observations

HTTP1 Monitor

HTTP2

Monitor

Host

Action

Chosen

Trajectory Tree Computation

Action

Chosen

Target system

HostA

Web1 Server

App1 Server

50%

HostB

Web2

Server50%

C

DB50%

50%

App2

Server

Execute Action

Wait for monitor alert

Diagnose

Choose Action

Offline Computation

POMDP

BoundsNew Contribution

Model of Faults

Actions, Monitors,

Rewards

Compute

RA-Bound

Online Computation

Bounds

Improvement(sim model)

RA-Bound

Model of Faults

Actions, Monitors,

Rewards

Compute

RA-Bound

Bounds

Improvement(sim model)

RA-Bound

?

Execute monitors

No

Yes

Done

Design for Resiliency 15

Page 16: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Example 2: Recovery and Response Approach for Malicious

Attacks (DSN’09, IEEE Trans. Par. & Dist. Sys 2014)

Design for Resiliency

• RRE: a real-time automatic, scalable, adaptive and cost-sensitive intrusion response system

– Accounts for planned adversarial behavior

– Accounts for uncertainties in IDS alerts

• Models adversary behavior and responses using Attack-Response Tree (ART)

• Employs a game-theoretic response strategy against adversaries in a two-player Stackelberg game

• Developed distributed and hierarchical prototype implementation

16

Page 17: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

”World View”System Model

PRDC’15

OFFLINE/ONLINE

COMPUTATION

Diverse SystemMonitoringPRDC’17,

HoTSoS’16

Monitor FusionHoTSoS’16,

SRDS’16

Response Selection and

ActuationGameSec’16

ONLINE COMPUTATION

Current Work Guided is by Notional Architecture

Design for Resiliency

Monitor Placement

DSN’16

RESILIENCY

INFRASTRUCTURE

Secure Monitoring and

Response Infrastructure

17

Page 18: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

World View Model Construction using CPTL

(PRDC’15)

• Situational awareness is needed for resiliency

• CPTL models cyber, physical, and human system aspects

• Is a system state model that is:

• represents heterogeneous types of data and the relations among them,

• is updated at runtime

Design for Resiliency

”World View”System Model

• CPTL can be used to:

• exchange data among resiliency providing mechanisms

• calculate metrics on system state

18

Page 19: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Monitor Placement Methodology (DSN’16)

• Methodology for monitor deployment to meet intrusion detection goals andminimize monitoring cost

–Uses quantitative metrics to capture monitor utility and cost

–Uses integer programming to determine optimal monitor deployment based on intrusion detection goals and cost requirements

Administrator Monitors

decides how

to deploy

send

data to

SIEM System

Dialog Title

Dialog Title

Dialog Title

generate

Alerts

responded to by

Monitor Deployment Methodology

uses

Design for Resiliency

Monitor Placement

EventsIndicators

Mo

nit

ors

1 2 Red

2 1 Red

3 0 Red

19

Page 20: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Diverse System Monitoring (PRDC’17)

• Kobra is a kernel level monitor– Collects process behavior traces using

kernel modules– Network operations, file operations,

process communication

• The traces are fused by generating a complex-valued time signal

• The normal behavior profile is generated by learning a space using sparse representation dictionary learning

• Anomaly detection uses the learned profile to detect actions that lie outside the space of known actions 20

Design for Resiliency

Diverse SystemMonitoring

Page 21: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Monitor Fusion Algorithms (HoTSoS’16)

• Combine host-level authentication logs and network-level firewall logs

• Perform unsupervised cluster analysis

• Able to detect more intrusions than otherwise detected by each of the monitors individually

• Provide concise representation as a prioritized list of clusters

Design for Resiliency

Monitor Fusion

System Logs

Firewall Logs

FeatureExtraction

FeatureSelection&Fusion

ClusterAnalysis

IntrusionDetection

DataSources

21

Page 22: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Monitor Fusion Algorithms (SRDS’16)

• Lateral Movement detection by fusing host-level process communication with network flow information

• Process communication used to infer network flow causation– Kobra collects the communication

events and builds a process communication graph

– Avoids the use of heuristics or signatures

• Hierarchical fusion of events results in a causation chain that describes lateral movement in the system

• Local inference of causation events allows for fusion without the need for a global clock

22

Design for Resiliency

Monitor Fusion

A C

S1

P1

P2

P3

P4

P5

S2

F

Kobra: Host-view

T=1

T=3

T=4

T=5

T=6

T=0

Host

Process

Socket

Page 23: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Response Selection and Actuation (GameSec’16)

• Goal is to design an autonomous incident response engine– Uses game theory for

decision making– Uses real data-sets (when

available)– Can scale to large systems

• Account for the effects of response actions

• Account for the system evolution• Account for the defender’s

observations and actions• Make online decisions • Hierarchical design for scalability

Design for Resiliency

Response Selection and

Actuation

23

Page 24: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path ForwardTrust Assessment 24

Engineering in Resiliency:

Assessment

Page 25: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Trust Assessment Challenge

• Systems operate in adversarial environments

– Adversaries seek to degrade system operation by

affecting the confidentiality, integrity, and/or availability

of the system information and services

– “Secure” systems must be able to meet their operational

objectives despite attack attempts by adversaries

• System security is not absolute

– No real system is perfectly secure

– Some systems are more secure than others

– But how much more secure are they?

Trust Assessment 25

Page 26: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Quantifying Resiliency

• At design time

– System architects make trade-off decisions to best meet all

design criteria

– Other design criteria can be quantified: performance, reliability,

operating and maintenance costs, etc.

– How can we quantify the security of different system designs?

• During system operation and maintenance

– Modifying the system architecture can improve or worsen

system security

– How can we compare the security of different possible system

configurations?

Model-based system-level resiliency evaluation

Trust Assessment 26

Page 27: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Practical Applications of Security Metrics

Organizational-level Metrics

Questions the CIO cannot answer:

• How much risk am I carrying?

• Am I better off now than I was this time last year?

• Am I spending the right amount of money on the right things?

• How do I compare to my peers?

• What risk transfer options do I have?

(From CRA, Four Grand Challenges in Trustworthy Computing, 2003)

Technical Metrics

Questions the design engineer cannot answer:

• Is design A or B more secure (confidentially, integrity, availability, privacy)?

• Have I made the appropriate design trade off between timeliness, security, and cost?

• How will the system, as implemented, respond to a specific attack scenario?

• What is the most critical part of the system to test, from a security point of view?A Question neither can answer:

• How do the technical metrics impact the organizational-level security metrics?

27Trust Assessment

Page 28: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Contrasting Approaches

Typical Situation Today:

• Process:

– Rely on a trusted analyst

(wizard?) that examines

situation, and gives advice

based on experience, or

– Form decision in a collective

manner based on informal

discussions among stakeholder

experts

• Limitations:

– No way to audit decision

process

– No quantifiable ranking of

alternative options

Goal For Tomorrow:

• Usable tool set that enables

diverse stakeholders to express

• Multi-faceted aspects of

model

• Multiple objectives

• Way for diverse stake holders to

express concerns and objectives

in common terminology

• Quantifiable ranking of alternate

security policies and architectures

• Auditable decision process

Trust Assessment 28

Page 29: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

Hacker, Foreign Gov.

Insider Engineer Hostile Org. Insider Engineer

Insider Technician, Insider Operator

Preview of ADVISE

Analysis Results

29

Page 30: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

ADVISE Method Overview (DSN’10, MetriSec’10, QEST’11)

Attack Execution Graph Adversary Profile Metrics Specification

QuantitativeMetrics Data

Executable ADVISE Model

System Information Adversary Information Security Question

Convert Information into ADVISE Model Inputs

Auto-Generate the Executable ADVISE Model

Execute the ADVISE Model

Trust Assessment 30

Page 31: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Attack Execution Graph Editor

Trust Assessment 31

Page 32: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Adversary Editor

Trust Assessment 32

Page 33: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Model Execution: the Attack Decision Cycle

• The adversary selects the most attractive available attack step based on his attack preferences.

• State transitions are determined by the outcome of the attack step chosen by the adversary.

Determine all Available Attack Steps in State si

Stochastically Select the Attack Step Outcome

CurrentState si

UpdatedState sk

Choose the Most Attractive of the Available

Attack Steps

Trust Assessment 33

Page 34: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Hacker, Foreign Gov.

Insider Engineer Hostile Org. Insider Engineer

Insider Technician, Insider Operator

Preferred Attack Paths

Without Recloser Radios

Trust Assessment 34

Page 35: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

Foreign Gov.

Insider Engineer Hostile Org.

Insider Technician, Insider Operator

Preferred Attack Paths

With Recloser Radios

Insider Operator

Hacker

Trust Assessment 35

Page 36: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

0 2 4 6 8 10 12 14 16 18 20

Foreign Gov

Hacker

Hostile Org

Engineer

Engineer

Operator

Technician

Time to Achieve Attack Goal (Hours)

Attack Speed Without Recloser Radios

0 2 4 6 8 10 12 14 16 18 20

Foreign Gov

Hacker

Hostile Org

Engineer

Operator

Operator

Technician

Time to Achieve Attack Goal (Hours)

Attack Speed With Recloser Radios

Minor Equipment Damage & Service Disruption

Minor Equipment Damage & Service Disruption

Local Equipment Damage & Service Disruption

System-wide Equipment Damage & Service Disruption

System-wide Damage & Disruption

Backdoor SW on SCADA LAN

Backdoor SW on SCADA LAN

Minor Equipment Damage & Service Disruption

Minor Equipment Damage & Service Disruption

System-wide Service Disruption

System-wide Service Disruption

System-wide Damage & Disruption

System-wide Service Disruption

Backdoor SW on SCADA LAN

Trust Assessment 36

Page 37: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

The Path Forward

The Path Forward 37

Page 38: Engineering in Cyber Resiliency: A Pragmatic* Approachee380.stanford.edu/Abstracts/161019-slides.pdfIntrusion Response System Monitor 1. . . Monitor n Action 1. . . Action m Alerts

The Challenge Design for Resiliency Trust Assessment The Path Forward

The Path Forward

38

• Perfect security is science fantasy, and perfection is the

enemy of good

• Resiliency mechanisms are needed to tolerate attacks,

responding to provide a specified service despite

partially successful attacks

• Assessment tools are needed at design time to choose

between alternative resiliency mechanisms

• For the good of society, pragmatic approaches are

needed to engineer resiliency into cyber systems for use

in critical applications

• We’re just at the beginning of the journey, and much

work remains to be done

The Path Forward