[Infowarrior] - MIT software aims to thwart hackers

Richard Forno rforno at infowarrior.org
Thu Aug 28 10:53:20 UTC 2008


NETWORK SECURITY  	

http://www.ll.mit.edu/publications/labnotes/pluggingtherightholes.html

Posted July 2008

Plugging the Right Holes

NetSPA software maps computer networks to find paths most vulnerable  
to hacking.

On the night of November 1, 2004, according to published reports,  
hackers in the Chinese province of Guangdong broke into computers at  
the Army Information Systems Engineering Command in Arizona, the  
Defense Information Systems Agency in Virginia, the Naval Ocean  
Systems Center in California, and the Army Space and Strategic Defense  
Installation in Alabama. The attack, Time magazine and The Washington  
Post wrote, was part of Titan Rain, a series of breaches of U.S.  
government computers that occurred between 2003 and 2005 and may have  
captured sensitive information about military readiness.

In fact, says electrical engineer Richard Lippmann, a senior staff  
member in Lincoln Laboratory's Information Systems Technology Group,  
U.S. government and defense computer networks are attacked all the  
time. In response to this chronic cyber threat, he and his colleagues  
developed NetSPA, a software tool to identify potential avenues of  
attack in computer networks. NetSPA (for Network Security Planning  
Architecture) uses information about networks and the individual  
machines and programs running on them to create a graph that shows how  
hackers could infiltrate them. Although system administrators can  
examine visualizations of the graph themselves to decide what action  
to take, NetSPA analyzes the graph and offers recommendations about  
how to quickly fix the most important weaknesses.

NetSPA relies on vulnerability scanners, such as Nessus, to identify  
known vulnerabilities in network-accessible programs that might allow  
an unauthorized person access to a machine. Fast-spreading worms, for  
instance, often take advantage of weaknesses in servers or operating  
systems to spread from one machine to another. But simply being aware  
of vulnerabilities is not sufficient; NetSPA also has to analyze  
complex firewall and router rules to determine which vulnerabilities  
can actually be reached and exploited by attackers and how attackers  
can spread through a network by jumping from one vulnerable host to  
another.

"It's a matter of what the attacker can get to and in what order,"  
says Kyle Ingols, a computer scientist in Lippmann's group who is  
working on NetSPA, along with Seth Webster (who is focusing on ways to  
make the system more automated) and MIT graduate student Leevar  
Williams (whose master's thesis is on visualizing attack graph data).  
It takes a long time to patch all hosts in a network. "If you spend  
time patching vulnerabilities the attacker can’t get to first," Ingols  
says, "you've left your network exposed longer."

NetSPA aims to solve that problem. "Instead of patching or fixing or  
blocking a thousand hosts," Lippmann explains, "we could say there are  
ten critical hosts and patch those first."

The software finds the most critical weaknesses by combining  
information from vulnerability scanners with firewall rules used to  
allow and block access and information about the physical structure of  
the network. For instance, if a firewall allows a certain kind of  
access, hackers could use that access to reach a vulnerable machine on  
the inside of the network. That might grant them access to only one  
machine, but once they take over that machine inside the firewall,  
they then gain access to many more. Thus, a route through the firewall  
to a vulnerability on a single "steppingstone" host is much more  
critical than the potentially many other vulnerabilities on the network.
Photonics



A screen shot shows an attack graph cascade. Each of the four large  
rectangular regions represents one subnet in a larger network. Within  
each subnet, the smaller rectangular regions represent groups of hosts  
that are treated identically by all firewalls and that are compromised  
by an attacker to the same level. The dot at the center of each region  
signifies all hosts in that region. The attacker starts at the upper  
subnet ("EXTLAN") on a single host (topmost dark rectangle). Lines  
connecting hosts represent vulnerabilities that the attacker uses to  
progressively compromise more hosts. After one hop, the attacker  
compromises all vulnerable hosts in the upper subnet and jumps to two  
hosts in the next subnet ("lansubnet"). On the next hop, the attacker  
compromises all vulnerable hosts in the second subnet and jumps to two  
hosts in the third subnet ("enclave DMZ"). On the third hop, the  
attacker compromises one more host in the third subnet and cannot  
reach the fourth subnet at the bottom of the display.

This insight sounds obvious, but applying it to real systems can be a  
huge challenge. A network comprising thousands of computers may have  
dozens of filtering devices such as firewalls and routers, and each  
device may have 200 or more different filtering rules. The  
multitudinous combinations of possibilities are far too many to track  
down by hand, and are even very complex for a computer algorithm to  
compute. The original version of NetSPA, in fact, could handle  
networks of only about 17 machines before the modeling complexities  
made it too slow to be useful.

Since then, however, the Lincoln Laboratory researchers have developed  
ways to speed NetSPA up. For instance, firewalls may have rules that  
treat a number of different machines on the same network in the same  
way. Rather than modeling each of those machines individually, the  
software uses the same model for all of them, saving significant  
computing time. The researchers have also developed new types of  
attack graphs and efficient algorithms to compute these graphs.

In examining firewall rules, NetSPA also has the potential to discover  
unforeseen avenues of attack. For example, a network might have had to  
share data with an outside vendor several years ago, so the system  
administrator would have added a rule to allow access from that  
vendor's IP address. That long-forgotten permission could be exploited  
by someone forging that address.

Lincoln Laboratory researchers have received one patent for the first  
type of attack graph they developed, called a "predictive" graph, and  
have one patent pending for a much more efficient and recurrent type  
called a "multiple prerequisite" attack graph. They're testing NetSPA  
on different networks and developing ways to make it easier to use. A  
group of MIT students created a business plan for a proposed company  
called CyberAnalytix that could commercialize NetSPA (Lippmann and  
Ingols are technical advisors). This plan won $10,000 in the MIT $100K  
Entrepreneurship Competition in May. If CyberAnalytix fulfills the  
students' goals, the tool it sells could provide a protective umbrella  
in case anything like Titan Rain were to fall again. 


More information about the Infowarrior mailing list