An attack-resilient grid auditing infrastructure

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

  • Christopher Kunz
  • Jan Wiebelitz
  • Matthew Smith

Organisationseinheiten

Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Seiten635-639
Seitenumfang5
PublikationsstatusVeröffentlicht - 1 Juni 2010
Veranstaltung2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 - Beijing, China
Dauer: 25 Juni 201027 Juni 2010

Publikationsreihe

NameProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Abstract

As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

ASJC Scopus Sachgebiete

Zitieren

An attack-resilient grid auditing infrastructure. / Kunz, Christopher; Wiebelitz, Jan; Smith, Matthew.
Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. S. 635-639 5541857 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Kunz, C, Wiebelitz, J & Smith, M 2010, An attack-resilient grid auditing infrastructure. in Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010., 5541857, Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, S. 635-639, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, Beijing, China, 25 Juni 2010. https://doi.org/10.1109/WCINS.2010.5541857
Kunz, C., Wiebelitz, J., & Smith, M. (2010). An attack-resilient grid auditing infrastructure. In Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 (S. 635-639). Artikel 5541857 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010). https://doi.org/10.1109/WCINS.2010.5541857
Kunz C, Wiebelitz J, Smith M. An attack-resilient grid auditing infrastructure. in Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. S. 635-639. 5541857. (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010). doi: 10.1109/WCINS.2010.5541857
Kunz, Christopher ; Wiebelitz, Jan ; Smith, Matthew. / An attack-resilient grid auditing infrastructure. Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. S. 635-639 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010).
Download
@inproceedings{969eb36715b845e98be6a603b0e67548,
title = "An attack-resilient grid auditing infrastructure",
abstract = "As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.",
keywords = "Abuse detection, Auditing, Certificate, Network security, Network sniffing, OCSP, PKI, Proxy certificate, Revocation, Security, SSL, TLS, X.509",
author = "Christopher Kunz and Jan Wiebelitz and Matthew Smith",
year = "2010",
month = jun,
day = "1",
doi = "10.1109/WCINS.2010.5541857",
language = "English",
isbn = "9781424458516",
series = "Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010",
pages = "635--639",
booktitle = "Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010",
note = "2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 ; Conference date: 25-06-2010 Through 27-06-2010",

}

Download

TY - GEN

T1 - An attack-resilient grid auditing infrastructure

AU - Kunz, Christopher

AU - Wiebelitz, Jan

AU - Smith, Matthew

PY - 2010/6/1

Y1 - 2010/6/1

N2 - As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

AB - As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

KW - Abuse detection

KW - Auditing

KW - Certificate

KW - Network security

KW - Network sniffing

KW - OCSP

KW - PKI

KW - Proxy certificate

KW - Revocation

KW - Security

KW - SSL

KW - TLS

KW - X.509

UR - http://www.scopus.com/inward/record.url?scp=77957658761&partnerID=8YFLogxK

U2 - 10.1109/WCINS.2010.5541857

DO - 10.1109/WCINS.2010.5541857

M3 - Conference contribution

AN - SCOPUS:77957658761

SN - 9781424458516

T3 - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

SP - 635

EP - 639

BT - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

T2 - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Y2 - 25 June 2010 through 27 June 2010

ER -