ASPF: A Policy Administration Framework for Self-Protection of Large-Scale Systems Ruan He Marc Lacoste Orange Labs Security and Trusted Transactions Dept. {ruan.he,marc.lacoste}@orange-ftgroup.com Jean Leneutre Telecom ParisTech Network, Mobility and Security Dept. jean.leneutre@telecom-paristech.com Abstract—Despite its potential to tackle many security challenges of large-scale systems such as pervasive networks, self-managed protection has been little explored. This paper addresses the problem from a policy management perspective by presenting a policy-driven framework for self-protection of pervasive systems called ASPF (Autonomic Security Policy Framework). Enforced authorization policies in a device are adapted according to the security context, both at the network and device levels. ASPF describes how an autonomic security manager may control OS-level authorization mechanisms sup- porting multiple classes of policies. Evaluation of an ASPF implementation shows that the framework enables effective self-protection of pervasive systems. ASPF is also applicable for autonomic security management of other types of large- scale infrastructures such as cloud environments. Keywords-Autonomic Computing, Self-Protection, Policy Management, Authorization, Pervasive Networks. I. I NTRODUCTION Advances in pervasive networking are rapidly taking us to the final frontier in security, revealing a whole new landscape of threats. In open and dynamic environments, malicious nodes may enter a network undetected, and vari- ous malwares may invisibly install themselves on a device. When roaming between heterogeneous networks, each with its own protection requirements, a device may also take advantage of security policy conflicts to gain unauthorized privileges. In embedded settings including limited and often unstable computing and networking resources, denial of service attacks are easier, with little lightweight security countermeasures. Finally, these decentralized, large-scale systems make end-to-end security supervision difficult. Ad- ministration by hand is clearly impossible, with the risk of some sub-system security policies not being up-to-date. These threats may only be mitigated with mechanisms highly adaptable to execution conditions and security requirements (e.g., supporting multiple authorization policies), with lim- ited overhead. Above all, protection mechanisms should be self-managed [1], following the autonomic approach to security introduced by IBM [2], which defines a self- protecting system as a system that “can anticipate, detect, identify and protect [itself] against threats.” [3]. To realize context-aware autonomic adaptations, the policy-driven paradigm has successfully demonstrated its flexibility and generality [4]: system functionalities are gov- erned by a set of policies. As the context changes, other policies may be selected to activate within the system func- tions better adapted to its new environment. Unfortunately, this type of design was little applied to self-protection of pervasive systems. In this paper, we validate the viability of this approach by presenting a policy-driven security management framework called ASPF (Autonomic Security Policy Framework). ASPF describes the design of an autonomic security manager for pervasive systems. The framework is built on an earlier implemented OS security architecture called Virtual Security Kernel (VSK) [5]–[7] that specifies the managed security mechanisms. VSK implements kernel-level policy-neutral authorization, and supports dynamic policy reconfiguration, but without describing any control strategy of adaptation. The original features of this framework are the following: ASPF enables the selection of the most appropriate authorization policy to be enforced in the device in order to match the estimated risk level of the current environment. Two levels of adaptation are possible, policies being tuned (or generated) according to the security context of the network and of the device. Policies are specified in an XACML extension for the attribute-based model of access control [8], which pro- vides a fairly generic manner to describe permissions in open systems. An authorization architecture is also defined to refine the ASPF models, and is implemented above the VSK authorization mechanisms. Performance, resilience, and security evaluation results show that the combined ASPF and VSK frameworks enable to achieve effective self-protection (Section IX-B evaluates the autonomic maturity level achieved with ASPF regarding security mechanisms). Moreover, ASPF is generic enough to be applied to other types of large-scale infrastructures such as cloud computing environments by defining the proper framework refinement. 104 International Journal on Advances in Security, vol 3 no 3 & 4, year 2010, http://www.iariajournals.org/security/ 2010, © Copyright by authors, Published under agreement with IARIA - www.iaria.org