An attack-resilient grid auditing infrastructure

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Authors

  • Christopher Kunz
  • Jan Wiebelitz
  • Matthew Smith

Research Organisations

View graph of relations

Details

Original languageEnglish
Title of host publicationProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Pages635-639
Number of pages5
Publication statusPublished - 1 Jun 2010
Event2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 - Beijing, China
Duration: 25 Jun 201027 Jun 2010

Publication series

NameProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Abstract

As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

Keywords

    Abuse detection, Auditing, Certificate, Network security, Network sniffing, OCSP, PKI, Proxy certificate, Revocation, Security, SSL, TLS, X.509

ASJC Scopus subject areas

Cite this

An attack-resilient grid auditing infrastructure. / Kunz, Christopher; Wiebelitz, Jan; Smith, Matthew.
Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. p. 635-639 5541857 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010).

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Kunz, C, Wiebelitz, J & Smith, M 2010, An attack-resilient grid auditing infrastructure. in Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010., 5541857, Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, pp. 635-639, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, Beijing, China, 25 Jun 2010. https://doi.org/10.1109/WCINS.2010.5541857
Kunz, C., Wiebelitz, J., & Smith, M. (2010). An attack-resilient grid auditing infrastructure. In Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 (pp. 635-639). Article 5541857 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010). https://doi.org/10.1109/WCINS.2010.5541857
Kunz C, Wiebelitz J, Smith M. An attack-resilient grid auditing infrastructure. In Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. p. 635-639. 5541857. (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010). doi: 10.1109/WCINS.2010.5541857
Kunz, Christopher ; Wiebelitz, Jan ; Smith, Matthew. / An attack-resilient grid auditing infrastructure. Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. 2010. pp. 635-639 (Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010).
Download
@inproceedings{969eb36715b845e98be6a603b0e67548,
title = "An attack-resilient grid auditing infrastructure",
abstract = "As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.",
keywords = "Abuse detection, Auditing, Certificate, Network security, Network sniffing, OCSP, PKI, Proxy certificate, Revocation, Security, SSL, TLS, X.509",
author = "Christopher Kunz and Jan Wiebelitz and Matthew Smith",
year = "2010",
month = jun,
day = "1",
doi = "10.1109/WCINS.2010.5541857",
language = "English",
isbn = "9781424458516",
series = "Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010",
pages = "635--639",
booktitle = "Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010",
note = "2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 ; Conference date: 25-06-2010 Through 27-06-2010",

}

Download

TY - GEN

T1 - An attack-resilient grid auditing infrastructure

AU - Kunz, Christopher

AU - Wiebelitz, Jan

AU - Smith, Matthew

PY - 2010/6/1

Y1 - 2010/6/1

N2 - As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

AB - As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse . We achieve this by including an X.S09 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.

KW - Abuse detection

KW - Auditing

KW - Certificate

KW - Network security

KW - Network sniffing

KW - OCSP

KW - PKI

KW - Proxy certificate

KW - Revocation

KW - Security

KW - SSL

KW - TLS

KW - X.509

UR - http://www.scopus.com/inward/record.url?scp=77957658761&partnerID=8YFLogxK

U2 - 10.1109/WCINS.2010.5541857

DO - 10.1109/WCINS.2010.5541857

M3 - Conference contribution

AN - SCOPUS:77957658761

SN - 9781424458516

T3 - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

SP - 635

EP - 639

BT - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

T2 - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Y2 - 25 June 2010 through 27 June 2010

ER -