An attack-resilient Grid auditing infrastructure

被引:0
|
作者
Kunz, Christopher [1 ]
Wiebelitz, Jan [1 ]
Smith, Matthew [1 ]
机构
[1] Gottfried Wilhelm Leibniz Univ, Distributed Comp Secur Grp, L3S, Hannover, Germany
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
关键词
X.509; proxy certificate; abuse detection; auditing; security; PKI; OCSP; revocation; network security; network sniffing; SSL; TLS; certificate;
D O I
10.1109/WCINS.2010.5541857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical. However, in the Grid it is particularly devastating, attacks against the head node affect unencrypted Grid proxy certificates. Using these, an attacker can act with the permissions of the original owner, undermining the Grid security concept. Even after the original attack has been detected and the affected systems have been sanitized, the attacker is still in possession of the stolen proxy. In previous work we introduced an auditing infrastructure that gives Grid users a way to reconstruct usage of their delegated credentials and detect their possibly abuse. We achieve this by including an X.509 certificate extension in a proxy credential signed by the Grid user - making the users request to track credential usage tamper-proof In this paper, we extend the auditing infrastructure by a novel encryption aware watchdog, which can detect proxy certificate misuse even in the face of complete root compromise of all accessible Grid resources. It correlates network communication in the Grid with the auditing infrastructure and can thus detect proxy certificate misuse and tampering with the auditing framework.
引用
收藏
页码:635 / 639
页数:5
相关论文
共 50 条
  • [1] Attack-resilient compliance monitoring for large distributed infrastructure systems
    Montanari M.
    Campbell R.H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 192 - 199
  • [2] Attack-Resilient Smart Grid Dynamic State Estimation Algorithm
    Rana, Md Masud
    Abdelhadi, Ahmed
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2020), 2020,
  • [3] Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Sokolsky, Oleg
    Pappas, George J.
    Lee, Insup
    IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (02): : 66 - 81
  • [4] An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources
    Wu, Yifu
    Mendis, Gihan J.
    He, Youbiao
    Wei, Jin
    Hodge, Bri-Mathias
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 485 - 491
  • [5] Attack-Resilient Sensor Fusion
    Ivanov, Radoslav
    Pajic, Miroslav
    Lee, Insup
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [6] Design, Analysis, and Implementation of ARPKI An Attack-Resilient Public-Key Infrastructure
    Basin, David
    Cremers, Cas
    Kim, Tiffany Hyun-Jin
    Perrig, Adrian
    Sasse, Ralf
    Szalachowski, Pawel
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 393 - 408
  • [7] Robust Data Driven Analysis for Electricity Theft Attack-Resilient Power Grid
    Khan, Inam Ullah
    Javaid, Nadeem
    Taylor, C. James
    Ma, Xiandong
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2023, 38 (01) : 537 - 548
  • [8] Attack-Resilient Temperature Sensor Design
    Kajol, Mashrafi Alam
    Yu, Qiaoyan
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [9] Recaptured attack-resilient watermarking scheme
    Mehta, Preeti
    Singh, Mahesh K.
    Singha, Nitin
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [10] Robustness of Attack-resilient State Estimators
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Tabuada, Paulo
    Sokolsky, Oleg
    Lee, Insup
    Pappas, George J.
    2014 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2014, : 163 - 174