stephen smaldone, vinod ganapathy, and liviu...

27
Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science Rutgers, The State University of New Jersey { smaldone, vinodg, iftode }@cs.rutgers.edu

Upload: truonghanh

Post on 04-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science Rutgers, The State University of New Jersey { smaldone, vinodg, iftode }@cs.rutgers.edu

Page 2: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 2

Alice @Trusted

Network File Servers

Alice @Untrusted Personal Device

Corporate Intranet

VPN Server

Firewall

Internet

VPN File

Accesses

Page 3: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 3

•  The working set of a process is the collection of information referenced by the process during a time interval. [Denning 1968] –  Temporal locality of a process’ memory accesses –  Memory pages to keep resident in memory to

optimize performance now and in the near future –  Informs memory page replacement algorithms to

avoid thrashing

Page 4: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 4

•  Setting –  Trusted Devices vs. Untrusted Devices

•  Applies the working set principle to network file system security (access control) –  Learn working set during trusted accesses –  Enforce working set during untrusted accesses

Page 5: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 5

•  Working Set-Based Access Control (WSBAC) –  Novel access control technique that estimates per-user file

access working sets and enforces during access from untrusted devices

•  Prototype Implementation of WSBAC for Network File Systems –  POLEX: Working set policy extraction –  POLEN: Working set policy enforcement

•  Evaluation using Real-World Network File System Traces –  Experimental evaluation of WSBAC using real-world NFS traces,

which suggests that WSBAC is feasible and highly-effective

Page 6: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 6

•  Introduction •  WSBAC Architecture •  FileWall •  WSBAC Design and Implementation •  Evaluation and Results •  Related Work •  Conclusions and Future Work

Page 7: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 7

POLEX

POLEN

File Server 1

2

1

1

2

3

3

Untrusted Devices

Working Sets

Trusted Network Domain (Corporate Intranet)

POLEN Vault Area

Trusted Devices

Page 8: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 8

Working Sets

Switch

File Server Policy View Namespace

(PVN) POLEX

Administrator

Trusted Devices

Page 9: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 9

Working Sets

File Server

POLEN

Untrusted Devices

Reliable Secondary

Authentication Mechanism

WSBAC Virtual Namespace

POLEN Vault Area

Page 10: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 10

Network File Server

FileWall

Network File System Client

Network File System Accesses

•  Network File System Protocols –  Composed of client/server messages –  Requests sent by client –  Responses sent by server

•  FileWall: An NFS Middlebox –  Interposed on client/server path –  External to client/server path

Page 11: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 11

FileWall: A Firewall for Network File System, S. Smaldone, A. Bohra, and L. Iftode. In the Proceedings of the 3rd IEEE International Symposium

on Dependable, Autonomic and Secure Computing (DASC'07).

Scheduler

Forwarder

Access Context

FileWall Policy

Request Handler File Server … FS Client

Response Handler

Page 12: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 12

Forwarder

Access Context

POLEX

Extraction Handler

Scheduler

Network File System

Stream

Administrator

View Handlers

Working Set Summaries

(Bloom Filters)

Page 13: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 13

Forwarder

Access Context

POLEN

Enforcement Handler

Scheduler

Network File System

Stream Speculation Handler

File Server

Client or

Vault Area

Working Set Summaries

(Bloom Filters)

Page 14: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 14

•  Introduction •  WSBAC Architecture •  FileWall •  WSBAC Design and Implementation •  Evaluation and Results •  Related Work •  Conclusions

Page 15: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 15

•  Goals –  What are the working set estimation costs (space and time)? –  How accurate is working set estimation? –  How time sensitive are working set estimates? –  How much does speculation reconciliation impact users? –  What are the network file system performance overheads?

•  Setup –  Systems: Dual 2.4 GHz CPUs, 3 GB RAM, Linux 2.6 –  Perform offline analysis using Harvard File System Traces

[Ellard’03] –  Custom NFS fine-grained file access generation utility –  OpenSSH compilation as application performance benchmark

Page 16: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 16

Size of Trace Time to Analyze State Size

1 Day (~3.3 GB - 6,308,023 Req/Res Pairs) 52 min 154MB

1 Hour (~140 MB - 262,834 Req/Res Pairs) 2.49 min 154MB

Page 17: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 17

Average Error Rate Over-Estimation Rate

Run 1 1.08% 31.6%

Run 2 0.76% 41.2%

Run 3 1.02% 42.5%

Run 4 0.79% 36.5%

Run 5 0.97% 42.9%

Average 0.92% 38.9%

Page 18: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 18

Day 1 Day 2 Day 3 Day 4 Day 5

User 1 0.26% 0.03% 0.02% 0.01% 0.01%

User 2 0.31% 4.4% 0.0% 3.3% 0.27%

User 3 0.37% 0.36% 0.82% 2.5% 0.61%

User 4 0.48% 1.8% 0.55% 0.66% 0.11%

User 5 0.18% 0.28% 0.18% 0.34% 0.27%

Average 0.32% 1.4% 0.31% 1.4% 0.27%

Page 19: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 19

Average Max Min

1.4% 2.4% 0.028%

Average Max Min

7 speculative rqst/day 12 speculative rqst/day >1 speculative rqst/day

•  For Heavy Users (~500 rqst/day):

Page 20: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 20

Page 21: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 21

Page 22: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 22

•  Policy Extraction and Inference –  RBAC Role Mining [Kuhlmann’03, Schlegelmilch’05] –  XACML AC Property Inference [Anderson’04,

Martin’06] –  Firewall Policy Inference [Golnabi’06, Tongaonkar’07] –  Gray-Box Systems [Arpaci-Dusseau’01]

•  Context-Aware Access Control –  Secure Collaborations in Mobile Computing

[Toninelli’06] –  Ubiquitous Services [Corradi’04, Yokotama’06] –  Ad-Hoc Networks [Saidane’07] –  Web Services [Bhatti’05, Kapsalis’06]

Page 23: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 23

•  WSBAC: Working Set-Based Access Control for Network File Systems –  Access control technique that estimates per-user working sets to

formulate access control policy for accesses from untrusted devices

–  Prototype design and implementation of POLEX and POLEN –  Experimental evaluation suggests that WSBAC is highly

effective, exhibiting low error rates

•  Future Work: Real-World Deployment and User Study –  Study qualitative impact on users (usability) –  Produce better network file system traces for future access

control studies

Page 24: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

http://discolab.rutgers.edu

Page 25: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 25

Network File Server

Network File System Client

Network File System Accesses

•  Network File System Protocols –  Composed of client/server messages –  Requests sent by client –  Responses sent by server

•  NFS (UNIX), CIFS/Samba (Windows), etc.

Page 26: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 26

PVN Root

PVN1

Control Shadow

Mirrored FS Namespace

FILE METADATA

EFFECTIVE AC

Shadow File Contents

•  Start / Stop Collection •  Modify Collection Parameters •  Modify View Parameters

Page 27: Stephen Smaldone, Vinod Ganapathy, and Liviu Iftodevinodg/papers/sacmat2009/sacmat2009_slides.pdf · Firewall Internet VPN File Accesses . ... • Prototype Implementation of WSBAC

June 5, 2009 SACMAT 2009 27

Alice’s Working Set

What does over-estimation mean?

Alice’s Working Set

What does an error mean?

X

X

X

O O

O