national cybersecurity center of excellence
play

National Cybersecurity Center of Excellence Mitigating IoT-Based - PowerPoint PPT Presentation

National Cybersecurity Center of Excellence Mitigating IoT-Based DDoS Build 1 Demonstration Presentation April 10, 2019 Challenge There will be 20.4 billion connected IoT devices by 2020 (per Gartner) As IoT devices become more common


  1. National Cybersecurity Center of Excellence Mitigating IoT-Based DDoS Build 1 Demonstration Presentation April 10, 2019

  2. Challenge • There will be 20.4 billion connected IoT devices by 2020 (per Gartner) • As IoT devices become more common in homes and businesses, security concerns are also increasing • IoT devices represent one of the largest attack surfaces – Some have minimal security, are unprotected or are difficult to secure • DDoS attacks increased by 28% in 2017 (per Akamai) • Recently IoT devices have been exploited to launch DDoS attacks (e.g. Mirai) National Cybersecurity Center of Excellence nccoe.nist.gov 2

  3. Typical Home/Small Business Network (Without MUD) National Cybersecurity Center of Excellence nccoe.nist.gov 3

  4. Attacker Manufacturer Server Internet Home/Small Business

  5. Attacker Manufacturer Server Internet Home/Small Business

  6. Attacker Manufacturer Server Internet Home/Small Business

  7. Attacker Manufacturer Server Internet Home/Small Business

  8. Attacker Manufacturer Server Internet Home/Small Business

  9. Attacker Manufacturer Server Internet Home/Small Business

  10. Attacker Manufacturer Server Internet Home/Small Business

  11. Attacker Manufacturer Server Internet Home/Small Business

  12. Attacker Manufacturer Server Internet Home/Small Business

  13. Attacker Manufacturer Server Internet Home/Small Business

  14. Typical Home/Small Business Network (With MUD) National Cybersecurity Center of Excellence nccoe.nist.gov 14

  15. Attacker Manufacturer Server Internet Home/Small Business

  16. Attacker Manufacturer Server Internet Home/Small Business

  17. Attacker Manufacturer Server Internet Home/Small Business

  18. Attacker Manufacturer Server Internet Home/Small Business

  19. Attacker Manufacturer Server Internet Home/Small Business

  20. Architecture Overview National Cybersecurity Center of Excellence nccoe.nist.gov 20

  21. Logical Architecture Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (5b) Device (2a) MUD URL traffic filters Router or Switch (1) MUD (6) IP URL in Address DHCP transaction Update Protocol Update Server Devices National Cybersecurity Center of Excellence nccoe.nist.gov 21

  22. Demonstration National Cybersecurity Center of Excellence nccoe.nist.gov 22

  23. Step 1: Connect Device Home or Small Business Network Router or Switch (1) MUD URL in DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 23

  24. Step 1: Connect Device Router or 1. No session on interface Switch Devices 2. Connect MUD enabled IoT Device Devices Router or 3. Interface state changed to up Switch National Cybersecurity Center of Excellence nccoe.nist.gov 24

  25. Step 2a/2b: Send MUD URL to MUD Manager Home or Small Business Network One Device MUD Manager (2b) MUD URL FreeRadius (2a) MUD URL Router or Switch (1) MUD URL in DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 25

  26. Step 2a/2b: Send MUD URL to MUD Manager FreeRadius 1. FreeRadius service receives and passes MUD URL National Cybersecurity Center of Excellence nccoe.nist.gov 26

  27. Step 2b: Send MUD URL to MUD Manager 2. MUD Manager receives MUD enabled IoT Device MUD information from FreeRadius Service Manager National Cybersecurity Center of Excellence nccoe.nist.gov 27

  28. Step 3/4: Get MUD and Signature File Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (2b) MUD (4b) Signature file URL FreeRadius (2a) MUD URL Router or Switch (1) MUD URL in DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 28

  29. Step 3/4: Send MUD URL to MUD Manager MUD 1. MUD Manager receives message Manager MUD 2. Get MUD and Signature file Manager MUD 3. Verify MUD file Manager National Cybersecurity Center of Excellence nccoe.nist.gov 29

  30. Step 5a: Send Device Traffic Filters Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (2a) MUD URL Router or Switch (1) MUD URL in DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 30

  31. Step 5a: Send Device Traffic Filters MUD 1. MUD File parsed and translated to ACL (rules) Manager MUD 2. MUD Manager sends ACL Manager National Cybersecurity Center of Excellence nccoe.nist.gov 31

  32. Step 5a: Send Device Traffic Filters 3. FreeRadius receives ACL from MUD Manager FreeRadius National Cybersecurity Center of Excellence nccoe.nist.gov 32

  33. Step 5b: Send Device Traffic Filters Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (5b) Device (2a) MUD URL traffic filters Router or Switch (1) MUD URL in DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 33

  34. Step 5b: Send Device Traffic Filters FreeRadius 1. FreeRadius sends ACL to switch Router or 2. ACL received and configurations applied Switch National Cybersecurity Center of Excellence nccoe.nist.gov 34

  35. Step 6: IP Address Assigned Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (5b) Device (2a) MUD URL traffic filters Router or Switch (1) MUD (6) IP URL in Address DHCP transaction Devices National Cybersecurity Center of Excellence nccoe.nist.gov 35

  36. Step 6: IP address assigned 1. IoT Device receives IP address Devices National Cybersecurity Center of Excellence nccoe.nist.gov 36

  37. Step 6: IP address assigned Router or 1. Show access-session Switch Router or 2. Show access-lists Switch National Cybersecurity Center of Excellence nccoe.nist.gov 37

  38. Step 7: Test communication Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (5b) Device (2a) MUD URL traffic filters Router or Switch (1) MUD (6) IP URL in Address DHCP transaction Update Protocol Update Server Devices National Cybersecurity Center of Excellence nccoe.nist.gov 38

  39. Step 7: Test communication 1. Test browsing to “Update Server” Devices 2. Test browsing to unapproved server Devices National Cybersecurity Center of Excellence nccoe.nist.gov 39

  40. Next Steps Home or Small Business Network (3a) HTTPS get URL (MUD file) (4a) HTTPS get URL (Signature file) One Device MUD MUD Manager File Server (3b) MUD file (5a) Device (2b) MUD (4b) Signature file traffic filters URL FreeRadius (5b) Device (2a) MUD URL traffic filters Threat Signaling Threat Signaling Router or Server (w/ Intel Switch Provided data) (1) MUD (6) IP URL in Address DHCP transaction Update Protocol Update Server Devices National Cybersecurity Center of Excellence nccoe.nist.gov 40

  41. Questions

Recommend


More recommend