SlideShare a Scribd company logo
1 of 35
Download to read offline
Building Intelligent Automatons
with Semantic Reasoning
Anton Goncharov
@ag0x00
BSides San Francisco
April 15 2018
Agenda
Who Am I?
What Is This?
A Bit of Perspective
Semantic Technology
Things, not Strings
Power of Ontologies
Real Intelligence with Reasoning
New Opportunities
Who Am I
Anton Goncharov, CISSP
20+ years Information Security
Management
12+ years Security Information
Management
Semantic Reasoning battle scars
My passion: data tells a story
https://linkedin.com/in/
securityservices/
https://twitter.com/ag0x00
What’s This About
A. Our current approach to InfoSec Management is broken
B. Semantic Reasoning can help
Day In Life of Security Analyst
Data ??? “Insights”
What’s In The Box?!!
Strongly Worded Statements
“Log Management” fails
volume and variety
Useless dashboards
Missing context
Unreliable detection
“Dumb” algorithms
Zombie workflows
Tribal knowledge
This whole “Security Log Analytics” approach sucks
Congrats. Now go investigate each IP address…
Pain
We Were Promised a Single Pane of Glass…
Our tools struggle to represent
the complexity of our environments.
Solution
Semantic Technologies to the Rescue
Information Architecture
Creation
Gathering
Presentation
Organization
Integration
Conversation
Data Information Knowledge
Experience
Context
Data Sources Cases, Tickets Incident Reports
Wikis
Source: http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
Semantic Technology
Capture and represent knowledge as a network of facts
Automatically make conclusions based on these facts
Fill gaps in information provided by data
Focus on problems of higher order
High level stack
SPARQL
RDF
RDFS
OWL
Triple Store Data Store
Data Model
Ontology / Semantics
Graph Query
Language
Brief Explanation of OWL and RDF
OWL2 is an ontology description language built on top of the Resource
Description Framework (RDF). RDF describes a way of storing data that is
different from the traditional table-based conception.
RDF data consists of triples, and only triples; each triple, called
a statement consists of a subject, predicate, and an object.
The subject represents a resource of some kind, the predicate a relation, and
the object can either be a literal value or another resource.
OWL2 and the RDF Schema (RDFS) define a set of resources and properties
that can be used to develop ontologies for RDF datasets.
Don’t Trust
Labels
{ “user” : “bob” }
Source: https://www.redbubble.com/people/souldroid/works/24128828-admins-of-the-galaxy
“Sure, but
which one?”
Object Based Processing (OBP)
Same ‘username’ label can refer to accounts on multiple hosts
with the same name (‘root’)
Thinking about everything as objects and relationships
between them is how we understand our world
Friend “George” vs an unknown friend who gambles, watches
QVC, buys a fancy litter box, does not own a cat
Which one is better described?
Defining Uniqueness
Q: So how do we know if two “things” are the same?
A: It depends:
In some cases (e.g. IP address), label is enough - 127.0.0.1 is the same address, even though it
might be used by every host
In some cases, not enough — like a person’s name.
Either look for unique identifier (like SSN or passport number), or
Use probabilistic approach and leverage known relationships.
For example, there’s probably only one John Smith that works at ‘Marketing', out of
‘London’ office, and reports to 'Bill Baker’. 
There is are many ‘eth0’ network interfaces, but only one on your host. 
The Power of Language
‘MYLAPTOP’
(host)
‘ACMEANTON’
(credential)
exists
on
Subject ObjectPredicate
“I can use domain account to log in to my laptop.”
Vertex VertexEdge
Event as a subgraph
Attempted
Authentication
(event)
‘MYLAPTOP’
(host)
‘ACMEANTON’
(credential)
‘PRDSERVER’
(host)
‘ANTON’
(auth token)
’10.0.0.1’
(ip address)
exists
on
initiated
by
initiated
from
uses
attempted
at
uses
Ontologies
Ontologies define the structure of knowledge for
various domains.
Why Use Ontology
Federates data in common language — search across domains
Facilitates reasoning — automate low level data analysis
Supports “analytic pivoting” — answer questions you didn’t
realize you had
Chains attack evidence — find parts of other attacks
Some useful concepts
1. Inheritance
2. Reverse edges
3. Axioms (reasoning rules) Employee
Person
DoB
DL #
DoB
DL #
Employee ID
Class
Subclass
Domain
Host
belongs to
contains
1.
2.
Hardware
Peripheral
Device
Printer
Mobile
Computer
Laptop Cellular Phone Desktop Server
Organization
Location
Has Vendor
Deployed At
Stationary
Computer
Computing
Machine
OWL Example
:UserAccount a owl:Class ;
rdfs:comment "an individual set of credentials."@en ;
rdfs:label “User Account”@en ;
rdfs:subClassOf owl:Thing .
:hasFullName
a owl:DatatypeProperty ;
rdfs:comment "and extended name or description, used only for display purposes"@en ;
rdfs:label "has full name"@en ;
rdfs:domain :UserAccount ;
rdfs:range xsd:string .
:memberOfGroup
a owl:ObjectProperty ;
rdfs:domain :UserAccount ;
rdfs:label "is member of Group"@en ;
rdfs:range :Group ;
Source: https://github.com/twosixlabs/icas-ontology
Existing Ontologies for Cybersecurity
By Mark Philpot:
https://github.com/daedafusion/cyber-ontology
Focuses on intelligence standards like CAPEC, STIX, CVE, etc.
Integrated Cyber Analysis System (ICAS), DARPA funded:
https://github.com/twosixlabs/icas-ontology
Healthy mix of intelligence feeds and internal environment objects
MITRE DFAX:
https://www.sciencedirect.com/science/article/pii/S1742287615000158
Built around CybOX
Focused on digital forensic investigations
Semantic
Reasoning
Semantic Reasoning I
1. Create a vertex or an edge that
must exist
Olaf
Ira
?
has uncle
has parent
has brother
?
Semantic Reasoning II
2. Promote a vertex or an edge
into a more specific subclass
Olaf
Ira
Bert
has uncle
has father
has brother
Male
Practical Example
installed on
Vulnerability
Software
Release
Software
Installation
Host
contains
instance of
vulnerable to
CVE-2018-2581
Oracle Java SE 9.0.1
/usr/lib/jvm/java-9
mybox.acme.org
Opportunities
Contextual Analytics — analyze facts instead of raw data
Clustering — “this host looks and acts a lot like Oracle DB
servers”
Outliers — “very unusual permissions for a salesperson
compared to the rest of the Sales team”
Similar Subgraphs — “this subgraph is an attack; find other
similar subgraphs”
Words of caution
• RDFS struggles with dynamic and temporal facts
A. Stick to property graphs
B. Express states as object
C. Make Edge a special Vertex class
D. Use GRAKN (https://grakn.ai)
• OWL ontologies can get complicated
• Use Turtle and visual editors (https://en.wikipedia.org/wiki/
Ontology_(information_science)#Editors)
• Continuously check grammar and dependencies
Parting Words
Semantic Web is not just for Google
anymore
You’re always dealing with Things
Judicious data modeling
Automate low level analysis
Manage knowledge
Stay in touch
Source: https://gizmodo.com/this-google-dream-bot-inspired-artwork-is-mind-blowing-1761049728
Thank You

More Related Content

What's hot

Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plugKamal Rathaur
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. Shubham Mittal
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015Mats Björe
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comSV Ruby on Rails Meetup
 
Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"Lviv Startup Club
 
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017MLconf
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon rosesreconvillage
 

What's hot (11)

Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet.
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
 
Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"
 
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon roses
 

Similar to 2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning

Repositories thru the looking glass
Repositories thru the looking glassRepositories thru the looking glass
Repositories thru the looking glassEduserv Foundation
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic WebBarry Smith
 
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...Anastasija Nikiforova
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Vaticle
 
The LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked DataThe LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked DataDavid Newbury
 
Content Repositories vs Knowledge Bases
Content Repositories vs Knowledge BasesContent Repositories vs Knowledge Bases
Content Repositories vs Knowledge Basesgokcebanu
 
State of the Semantic Web
State of the Semantic WebState of the Semantic Web
State of the Semantic WebIvan Herman
 
How to put an annotation in html
How to put an annotation in htmlHow to put an annotation in html
How to put an annotation in htmlSTIinnsbruck
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisAnton Chuvakin
 
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...NETWAYS
 
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...NETWAYS
 
Pentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar PaghdalPentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar PaghdalNSConclave
 
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODOLinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODOChris Mungall
 
Introduction to Application Profiles
Introduction to Application ProfilesIntroduction to Application Profiles
Introduction to Application ProfilesDiane Hillmann
 
Semantic Web 2.0
Semantic Web 2.0Semantic Web 2.0
Semantic Web 2.0hchen1
 
Beyond Internet Scanning
Beyond Internet ScanningBeyond Internet Scanning
Beyond Internet Scanningssuser227f24
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Grigory Sapunov
 

Similar to 2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning (20)

Repositories thru the looking glass
Repositories thru the looking glassRepositories thru the looking glass
Repositories thru the looking glass
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic Web
 
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
 
The LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked DataThe LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked Data
 
Content Repositories vs Knowledge Bases
Content Repositories vs Knowledge BasesContent Repositories vs Knowledge Bases
Content Repositories vs Knowledge Bases
 
State of the Semantic Web
State of the Semantic WebState of the Semantic Web
State of the Semantic Web
 
How to put an annotation in html
How to put an annotation in htmlHow to put an annotation in html
How to put an annotation in html
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
 
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
 
Big Data Analytics V2
Big Data Analytics V2Big Data Analytics V2
Big Data Analytics V2
 
Pentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar PaghdalPentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar Paghdal
 
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODOLinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
 
Introduction to Application Profiles
Introduction to Application ProfilesIntroduction to Application Profiles
Introduction to Application Profiles
 
Semantic Web 2.0
Semantic Web 2.0Semantic Web 2.0
Semantic Web 2.0
 
Beyond Internet Scanning
Beyond Internet ScanningBeyond Internet Scanning
Beyond Internet Scanning
 
Sanderson Shout It Out: LOUD
Sanderson Shout It Out: LOUDSanderson Shout It Out: LOUD
Sanderson Shout It Out: LOUD
 
Semantics
SemanticsSemantics
Semantics
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 

Recently uploaded (20)

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 

2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning

  • 1. Building Intelligent Automatons with Semantic Reasoning Anton Goncharov @ag0x00 BSides San Francisco April 15 2018
  • 2. Agenda Who Am I? What Is This? A Bit of Perspective Semantic Technology Things, not Strings Power of Ontologies Real Intelligence with Reasoning New Opportunities
  • 3. Who Am I Anton Goncharov, CISSP 20+ years Information Security Management 12+ years Security Information Management Semantic Reasoning battle scars My passion: data tells a story https://linkedin.com/in/ securityservices/ https://twitter.com/ag0x00
  • 4. What’s This About A. Our current approach to InfoSec Management is broken B. Semantic Reasoning can help
  • 5. Day In Life of Security Analyst
  • 7. Strongly Worded Statements “Log Management” fails volume and variety Useless dashboards Missing context Unreliable detection “Dumb” algorithms Zombie workflows Tribal knowledge This whole “Security Log Analytics” approach sucks
  • 8. Congrats. Now go investigate each IP address…
  • 9. Pain We Were Promised a Single Pane of Glass…
  • 10. Our tools struggle to represent the complexity of our environments.
  • 12. Information Architecture Creation Gathering Presentation Organization Integration Conversation Data Information Knowledge Experience Context Data Sources Cases, Tickets Incident Reports Wikis Source: http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
  • 13. Semantic Technology Capture and represent knowledge as a network of facts Automatically make conclusions based on these facts Fill gaps in information provided by data Focus on problems of higher order
  • 14. High level stack SPARQL RDF RDFS OWL Triple Store Data Store Data Model Ontology / Semantics Graph Query Language
  • 15. Brief Explanation of OWL and RDF OWL2 is an ontology description language built on top of the Resource Description Framework (RDF). RDF describes a way of storing data that is different from the traditional table-based conception. RDF data consists of triples, and only triples; each triple, called a statement consists of a subject, predicate, and an object. The subject represents a resource of some kind, the predicate a relation, and the object can either be a literal value or another resource. OWL2 and the RDF Schema (RDFS) define a set of resources and properties that can be used to develop ontologies for RDF datasets.
  • 18. Object Based Processing (OBP) Same ‘username’ label can refer to accounts on multiple hosts with the same name (‘root’) Thinking about everything as objects and relationships between them is how we understand our world Friend “George” vs an unknown friend who gambles, watches QVC, buys a fancy litter box, does not own a cat Which one is better described?
  • 19. Defining Uniqueness Q: So how do we know if two “things” are the same? A: It depends: In some cases (e.g. IP address), label is enough - 127.0.0.1 is the same address, even though it might be used by every host In some cases, not enough — like a person’s name. Either look for unique identifier (like SSN or passport number), or Use probabilistic approach and leverage known relationships. For example, there’s probably only one John Smith that works at ‘Marketing', out of ‘London’ office, and reports to 'Bill Baker’.  There is are many ‘eth0’ network interfaces, but only one on your host. 
  • 20. The Power of Language ‘MYLAPTOP’ (host) ‘ACMEANTON’ (credential) exists on Subject ObjectPredicate “I can use domain account to log in to my laptop.” Vertex VertexEdge
  • 21. Event as a subgraph Attempted Authentication (event) ‘MYLAPTOP’ (host) ‘ACMEANTON’ (credential) ‘PRDSERVER’ (host) ‘ANTON’ (auth token) ’10.0.0.1’ (ip address) exists on initiated by initiated from uses attempted at uses
  • 22. Ontologies Ontologies define the structure of knowledge for various domains.
  • 23. Why Use Ontology Federates data in common language — search across domains Facilitates reasoning — automate low level data analysis Supports “analytic pivoting” — answer questions you didn’t realize you had Chains attack evidence — find parts of other attacks
  • 24. Some useful concepts 1. Inheritance 2. Reverse edges 3. Axioms (reasoning rules) Employee Person DoB DL # DoB DL # Employee ID Class Subclass Domain Host belongs to contains 1. 2.
  • 25. Hardware Peripheral Device Printer Mobile Computer Laptop Cellular Phone Desktop Server Organization Location Has Vendor Deployed At Stationary Computer Computing Machine
  • 26. OWL Example :UserAccount a owl:Class ; rdfs:comment "an individual set of credentials."@en ; rdfs:label “User Account”@en ; rdfs:subClassOf owl:Thing . :hasFullName a owl:DatatypeProperty ; rdfs:comment "and extended name or description, used only for display purposes"@en ; rdfs:label "has full name"@en ; rdfs:domain :UserAccount ; rdfs:range xsd:string . :memberOfGroup a owl:ObjectProperty ; rdfs:domain :UserAccount ; rdfs:label "is member of Group"@en ; rdfs:range :Group ; Source: https://github.com/twosixlabs/icas-ontology
  • 27. Existing Ontologies for Cybersecurity By Mark Philpot: https://github.com/daedafusion/cyber-ontology Focuses on intelligence standards like CAPEC, STIX, CVE, etc. Integrated Cyber Analysis System (ICAS), DARPA funded: https://github.com/twosixlabs/icas-ontology Healthy mix of intelligence feeds and internal environment objects MITRE DFAX: https://www.sciencedirect.com/science/article/pii/S1742287615000158 Built around CybOX Focused on digital forensic investigations
  • 29. Semantic Reasoning I 1. Create a vertex or an edge that must exist Olaf Ira ? has uncle has parent has brother
  • 30. ? Semantic Reasoning II 2. Promote a vertex or an edge into a more specific subclass Olaf Ira Bert has uncle has father has brother Male
  • 31. Practical Example installed on Vulnerability Software Release Software Installation Host contains instance of vulnerable to CVE-2018-2581 Oracle Java SE 9.0.1 /usr/lib/jvm/java-9 mybox.acme.org
  • 32. Opportunities Contextual Analytics — analyze facts instead of raw data Clustering — “this host looks and acts a lot like Oracle DB servers” Outliers — “very unusual permissions for a salesperson compared to the rest of the Sales team” Similar Subgraphs — “this subgraph is an attack; find other similar subgraphs”
  • 33. Words of caution • RDFS struggles with dynamic and temporal facts A. Stick to property graphs B. Express states as object C. Make Edge a special Vertex class D. Use GRAKN (https://grakn.ai) • OWL ontologies can get complicated • Use Turtle and visual editors (https://en.wikipedia.org/wiki/ Ontology_(information_science)#Editors) • Continuously check grammar and dependencies
  • 34. Parting Words Semantic Web is not just for Google anymore You’re always dealing with Things Judicious data modeling Automate low level analysis Manage knowledge Stay in touch Source: https://gizmodo.com/this-google-dream-bot-inspired-artwork-is-mind-blowing-1761049728