SlideShare a Scribd company logo
1 of 31
Download to read offline
NORMAL 
DISTRIBUTIONS 
RULE EVERYTHING 
AROUND ME
NORMAL DISTRIBUTIONS RULE EVERYTHING AROUND ME
Many empirical quantities cluster around a typical value. The dice rolls in these casinos, the number of reporters on the wall of sheep every year, the air
pressure, the sea level, the temperature on a sunny BlackHat day in Vegas. All of these things vary somewhat, but their distributions place a negligible
amount of probability far from the typical value, making the typical value representative of most observations. For instance, it is a useful statement to say
that it is really fucking hot in vegas in August because it never deviates very far from this. Even the largest deviations, which are exceptionally rare, are still
only about a factor of two from the mean in either direction and hence the distribution can be well characterized by quoting just its mean and standard
deviation. But not everything.
ALEX HUTTON DREAMS OF RISK
My name is Alex Hutton and I model risk for a small too big to fail bank. Last year, like every other day, I woke up and built a risk model. Since weā€™re a
bank, we track the prices of a lot of things. For one of these widgets, I built a distribution of price movements. This one is a normal distribution and I
assumed that the s.dev was 3%, which is a typical number for daily price movements in financial markets. My boss used this to make some decisions, and
was quite happy. We made millions from the tiny everyday price fluctuations and trades.
SHIT GOES WRONG SLIDE
Today, however, we are fucked. Today is Black Monday, October 19, 1987 and the S&P drops by 21%. My boss freaks out, the firm is in financial ruin, my
kids starve.
How could this happen? Under my model, the probability of a 21% fluctuation is 10^-16, orā€¦ nonexistent.
So what happened? Well, the distribution of price fluctuations actually has a fat tail. In fact, the mistake I made was using a normal distribution. Take a look
at what happens if we use a power law distribution instead.
Probability 0.9 0.99 0.999 10
NORMAL 3.8 7.0 9.2 21
POWER 2.8 7.8 38.5 almost 0
SOMEBODY SET UP US THE BOMB!
Now, the chance of a 21% fluctuation is 0.08%, something that my risk model would certainly have included. And, would have certainly changed our
behavior on the financial markets. The good news is most financial firms are aware of this phenomenon, and model accordingly (after a few massive
failures). In info sec, weā€™re just not there yet.
MOTHERF*RS
SWANS
ACT LIKE ā€Ø
THEY FORGOT ā€Ø
ABOUT
Often, as Russell Thomas likes to point out, people mistake events that they did not predict for black swan events. However,
!
What makes a "Black Swan event" is not the event itself. Ā Instead, it is how that event fits into the object-observer system.
!
And in fact, the paradigm shift to using power law distributions to describe many of the variables we use in info sec explains away plenty of ā€œblack swansā€
- by making the object-observer system more receptive to rare, high impact events.
THE POWER LAW(S) 
OF INFORMATION
SECURITY
@mroytman
THE POWER LAW OF INFORMATION SECURITY
But in fact, nothing is linear. This talk is about the power laws which occur in information security, what they mean, where iā€™ve found some, and what to do
about them. The research iā€™ll present is far from done, but itā€™s a starting point and I hope to make you think twice before using a normal distribution in a
model again.
SLIDE WITH FRACTALS
WHAT ARE POWER LAWS
Power laws are distributions which describe scale-free phenomenon. What this means in lay manā€™s terms is that the same mechanism is at work across a
range of scales, and orders of magnitudes. In fact, power laws are a necessary and sufficient condition for scale free phenomenon. The importance and
ubiquity of scale free behavior was first pointed out by Mandlebrot, who coined the term ā€œfractalsā€. In fractals, we see the same behavior across different
scales of length, time, price or any other relevant variable with a scale attached to it.
A quantity is said to follow a power law if it is drawn from a probability distribution that looks like:
P(x) ~ Cx^alpha
!
alpha is a constant parameter of the distribution known as the exponent, or scaling parameter. typical scaling parameters are in the range 2-3, but there
are exceptions.
Lots of things follow a power law power law phenomenon. The oldest (1948) and cleanest statistical regularity in international relations is Richardson's law
which states that the severity of warfare is power law distributed. This behavior is not unique to wars, and occurs in natural sciences (traffic jams,
earthquakes, biodiversity, coastlines, brownian motion, asteroid impacts, etc) and social sciences (language, wealth, firm size, salaries, guild sizes in world
of warcraft, links to blogs). These power laws are considered fingerprints of a "complex" system; although what exactly is meant by complex is transient.
These systems generally produce outputs that are patterned, but have no standard(for lack of a better term) size in the Gaussian sense. More often than
not, a power law only applies to the values of a distribution greater than some minimum x. In these cases, we say that the tail follows a power law.
FAKE SWANS
Tails are vitally important. A power law is an instance of a fat tailed distribution. There exist precise proofs that ā€œsufficiently fat tailsā€ == power law
distributions. Measuring how fat a tail is, is actually quite difficult - The question of proving that something is or isnā€™t a power law, is often reduced to a
question of ā€œjust how fat the tail isā€.
You canā€™t tell the difference here, but when we go further outā€¦
You can see how much smaller the tails of the non-power law distributions are.
LACK OF PREDICTION
Why does this matter? Itā€™s because when the tails are small, we can say meaningful things about the ā€œmeanā€ and varianceā€ of the distributions. With a
power law distribution, the mean or variance donā€™t necessarily stay stable over time.
!
An interest aspect of power laws is that the alpha exponent has a natural interpretation. It is the cutoff above which moments of the function do not exist.
More familiarly, for exponents less than 2, the variance does not exist, and the central limit theorem does not apply. In effect, even with an infinite amount
of data, we cannot say much about the variance of such functions. For exponents less than 1, the mean does not exist. For this reason there is no such
thing as an ā€œaverage floodā€. There is instead a 100 year flood, a 10 year flood.
Perhaps we ought to start talking about the target breach as a ā€œ10 year breachā€.
!
But letā€™s get back to our own industry - why would information security exhibit power law behavior? And where?
First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results
stay power law distributed.
!
Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the
distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect
our own variables to inherit those power law properties.
LAW 1
First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results
stay power law distributed.
!
Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the
distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect
our own variables to inherit those power law properties.
BREACH FREQUENCY BY CVE TYPE
P(CVE has breach volume X) = X^-1.5
TheĀ Kolmogorovā€“Smirnov D-value: 0.1134174, xmin: 15, alpha: 1.5
!
The chance that a particular CVE has high breach volume is substantially higher than we previously thought, just like in the hutton example the chance that
the S&P dropped by 21% was underestimated.
ONE VULN WILL CAUSE YOUR BREACH
(OR A COUPLE)
What does this mean for you? It means there are vulnerabilities which have an extremely high probability of causing a breach. Since this breach data
comes from how attackers are behaving, having a handle on threat intelligence globally allows you to identify _which_ vulnerabilities are those most likely
to cause the breaches.
!
It means shifting your strategy away from trying to fix everything, or even trying to fix everything that comes out on patch tuesday, and instead focusing
on identifying and remediating the few vulnerabilities which are _most_ likely to cause a breach. THIS is non-linear thinking.
LAW 2
First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results
stay power law distributed.
!
Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the
distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect
our own variables to inherit those power law properties.
Kevin Thormsonā€™s talk tomorrow at 2pm - This talk introduces the VERIS Community Database (VCDB), a research project aimed at gathering news articles
about information security incidents, extracting data, and serving as a public repository of breach data suitable for analysis and research
ID THEFT FREQUENCY
P(Theft has X victims) = X^-0.7
beta 0.7+- 0.1 Malliart and Sornette, ETH Zurich 2009 (datalossdb).
!
STABLE ACROSS INDUSTRIES
beta 0.7+- 0.1 Malliart and Sornette, ETH Zurich 2009 (datalossdb).
ONE BREACH WILL MATTER MOST
(OR A COUPLE)
The takeaway here is that impact is concentrated in the fat tails of the distributions as well - it means we ought to be tailoring our strategies to preventing
the one big breach. This also means thereā€™s no average breach, and estimates of potential losses need to plan for scenarios like the black friday that was
missed in the opening example.
LAW 3
First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results
stay power law distributed.
!
Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the
distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect
our own variables to inherit those power law properties.
BREACH FREQUENCY BY DAY
P(Day has breach volume X) = X^-1.5
TheĀ Kolmogorovā€“Smirnov D-value: 0.1134174, xmin: 15, alpha: 1.5
!
ONE DAY ITā€™LL HAPPEN TO YOU
(OR A COUPLE)
SLIDE WITH WHAT DO 
WE DO ABOUT IT
From Russell: Handling Fat Tails for Decisionmakers
!
Here's a list of things that analysts and decision makers can do to successfully cope with the unruliness of very fat tailed probability distributions:
1. To the method of frequentist statistical analysis of historical data, add other methods and other data. Ā Simulations, laboratory experiments, and
subjective probability estimates by calibrated experts are just three alternative methods that can fill in for the limitations of frequentist methods with
limited sample data.
2. Resist using colloquial terms like "average", "typical", "spread", or even "worst case". Ā Using them will only add to confusion,
misunderstanding, and mis-set expectations.
3. Communicate and decide using quantiles, not the usually summary statistics mean, standard deviation, etc. Ā If any summary statistics are used
as decision criteria or in models, use quantiles.
4. Put in some effort to estimate the "fatness" of the tail, either parametrically or non-parametrically. Ā Even a not-very-good fat tail model is much better
than one based on thin tails. Ā There are ways to test how good the alternative models are. Ā  In my opinion, the best academic paper on this is "Power-law
distributions in empirical data".
You should model risk differently	

!
!
michael	

!
[8:21 AM]	

You should focus your efforts on identifying things that live in the fat tail or are predictors of it	

!
!
michael	

!
[8:22 AM]	

Bc there is no average	

!
!
michael	

!
[8:22 AM]	

you should never ever use metrics like average vulns closed or something like that
1. Investing to fix 100% of vulns is poor use of resources
2. When the Big Loss event happens, only one or a few vulnerabilities will be exploited
3. Ahead of that (ex ante), you need a systematic method to invest to fix a portfolio of vulns which, with very high confidence, include ALL of the
vulns that could be part of the Big Loss event. Ā These vulns will be strategically positioned in the most likely attack graphs.
4. And hereā€™s how youā€™d do that in practice ...
Holler!
www.risk.io
@mroytman
Dan Geer, Power. Law. http://geer.tinho.net/ieee/ieee.sp.geer.1201a.pdf
Clauset et al. Power Law Distributions in Empirical Data http://arxiv.org/abs/0706.1062
Farmer and Geanokoplos, Power Laws in Economics and Elsewhere
http://tuvalu.santafe.edu/~jdf/papers/powerlaw3.pdf
Malliart and Sornette, Heavy-Tailed Distribution of Cyber Risks, http://arxiv.org/abs/
0803.2256
poweRlaw R Package http://cran.r-project.org/web/packages/poweRlaw/vignettes/
poweRlaw.pdf
Gabaix, Some Nondescript NYU Stern Lecture on Power Laws http://pages.stern.nyu.edu/
~xgabaix/papers/powerLaws.pdf
Russell Thomas for graphs and everything he writes on http://
exploringpossibilityspace.blogspot.com/
THANKS!
and Alex Hutton

More Related Content

Viewers also liked

The truth information, power, upgrades.
The truth information, power, upgrades.The truth information, power, upgrades.
The truth information, power, upgrades.Marie Alcock
Ā 
The Power of Visual Content
The Power of Visual ContentThe Power of Visual Content
The Power of Visual ContentSally Falkow
Ā 
Richard Stirling - Power of Information TF
Richard Stirling - Power of Information TFRichard Stirling - Power of Information TF
Richard Stirling - Power of Information TFosimod
Ā 
Information is Power
Information is PowerInformation is Power
Information is Powerzekivazquez
Ā 
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridad
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridadHacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridad
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridadzekivazquez
Ā 
The Power of Visual Information
The Power of Visual InformationThe Power of Visual Information
The Power of Visual InformationTeun Spierings
Ā 
The Art of Visual Marketing by Peg Fitzpatrick and Guy Kawasaki
The Art of Visual Marketing by Peg Fitzpatrick and Guy KawasakiThe Art of Visual Marketing by Peg Fitzpatrick and Guy Kawasaki
The Art of Visual Marketing by Peg Fitzpatrick and Guy KawasakiPeg Fitzpatrick
Ā 
Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Judy O'Connell
Ā 
Knowledge is power - why is knowledge management critical to any company
Knowledge is power - why is knowledge management critical to any companyKnowledge is power - why is knowledge management critical to any company
Knowledge is power - why is knowledge management critical to any companyYves-Alain Schwaar
Ā 
Communication. Arun.Vi
Communication. Arun.ViCommunication. Arun.Vi
Communication. Arun.ViArun VI
Ā 
Component Of Communication
Component Of CommunicationComponent Of Communication
Component Of CommunicationPKT
Ā 
Points of distribution
Points of distributionPoints of distribution
Points of distributionChatham EMA
Ā 
Security for Human Beings
Security for Human BeingsSecurity for Human Beings
Security for Human Beingszekivazquez
Ā 
Understanding Digital Citizenship & Identity - Updated March 14
Understanding Digital Citizenship & Identity - Updated March 14Understanding Digital Citizenship & Identity - Updated March 14
Understanding Digital Citizenship & Identity - Updated March 14Alec Couros
Ā 

Viewers also liked (15)

The truth information, power, upgrades.
The truth information, power, upgrades.The truth information, power, upgrades.
The truth information, power, upgrades.
Ā 
The Power of Visual Content
The Power of Visual ContentThe Power of Visual Content
The Power of Visual Content
Ā 
Richard Stirling - Power of Information TF
Richard Stirling - Power of Information TFRichard Stirling - Power of Information TF
Richard Stirling - Power of Information TF
Ā 
Information is Power
Information is PowerInformation is Power
Information is Power
Ā 
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridad
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridadHacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridad
Hacking Drupal - AnatomĆ­a de una auditorĆ­a de seguridad
Ā 
The Power of Visual Information
The Power of Visual InformationThe Power of Visual Information
The Power of Visual Information
Ā 
The Art of Visual Marketing by Peg Fitzpatrick and Guy Kawasaki
The Art of Visual Marketing by Peg Fitzpatrick and Guy KawasakiThe Art of Visual Marketing by Peg Fitzpatrick and Guy Kawasaki
The Art of Visual Marketing by Peg Fitzpatrick and Guy Kawasaki
Ā 
Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0
Ā 
Knowledge is power - why is knowledge management critical to any company
Knowledge is power - why is knowledge management critical to any companyKnowledge is power - why is knowledge management critical to any company
Knowledge is power - why is knowledge management critical to any company
Ā 
Communication. Arun.Vi
Communication. Arun.ViCommunication. Arun.Vi
Communication. Arun.Vi
Ā 
Component Of Communication
Component Of CommunicationComponent Of Communication
Component Of Communication
Ā 
Points of distribution
Points of distributionPoints of distribution
Points of distribution
Ā 
Knowledge is power
Knowledge is powerKnowledge is power
Knowledge is power
Ā 
Security for Human Beings
Security for Human BeingsSecurity for Human Beings
Security for Human Beings
Ā 
Understanding Digital Citizenship & Identity - Updated March 14
Understanding Digital Citizenship & Identity - Updated March 14Understanding Digital Citizenship & Identity - Updated March 14
Understanding Digital Citizenship & Identity - Updated March 14
Ā 

More from Michael Roytman

CyberTechEurope.pptx
CyberTechEurope.pptxCyberTechEurope.pptx
CyberTechEurope.pptxMichael Roytman
Ā 
O'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalMichael Roytman
Ā 
RSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With PredictionsRSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With PredictionsMichael Roytman
Ā 
Predicting Exploitability
Predicting ExploitabilityPredicting Exploitability
Predicting ExploitabilityMichael Roytman
Ā 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Michael Roytman
Ā 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Michael Roytman
Ā 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
Ā 
Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015Michael Roytman
Ā 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceMichael Roytman
Ā 
Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014Michael Roytman
Ā 
Risk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach LandscapeRisk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach LandscapeMichael Roytman
Ā 
A Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability ManagementA Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability ManagementMichael Roytman
Ā 
Measure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done RightMeasure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done RightMichael Roytman
Ā 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OMichael Roytman
Ā 
BsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What MattersBsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What MattersMichael Roytman
Ā 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementMichael Roytman
Ā 

More from Michael Roytman (16)

CyberTechEurope.pptx
CyberTechEurope.pptxCyberTechEurope.pptx
CyberTechEurope.pptx
Ā 
O'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability Final
Ā 
RSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With PredictionsRSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With Predictions
Ā 
Predicting Exploitability
Predicting ExploitabilityPredicting Exploitability
Predicting Exploitability
Ā 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016
Ā 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Ā 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Ā 
Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015
Ā 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data Science
Ā 
Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014
Ā 
Risk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach LandscapeRisk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach Landscape
Ā 
A Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability ManagementA Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability Management
Ā 
Measure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done RightMeasure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done Right
Ā 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/O
Ā 
BsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What MattersBsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What Matters
Ā 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability Management
Ā 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Ā 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicevipmodelshub1
Ā 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
Ā 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Ā 
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ā˜
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Sheetaleventcompany
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Ā 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Ā 
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
Ā 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Ā 
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 

BsidesLV 2014 The Power Law of Information Security

  • 1. NORMAL DISTRIBUTIONS RULE EVERYTHING AROUND ME NORMAL DISTRIBUTIONS RULE EVERYTHING AROUND ME Many empirical quantities cluster around a typical value. The dice rolls in these casinos, the number of reporters on the wall of sheep every year, the air pressure, the sea level, the temperature on a sunny BlackHat day in Vegas. All of these things vary somewhat, but their distributions place a negligible amount of probability far from the typical value, making the typical value representative of most observations. For instance, it is a useful statement to say that it is really fucking hot in vegas in August because it never deviates very far from this. Even the largest deviations, which are exceptionally rare, are still only about a factor of two from the mean in either direction and hence the distribution can be well characterized by quoting just its mean and standard deviation. But not everything.
  • 2. ALEX HUTTON DREAMS OF RISK My name is Alex Hutton and I model risk for a small too big to fail bank. Last year, like every other day, I woke up and built a risk model. Since weā€™re a bank, we track the prices of a lot of things. For one of these widgets, I built a distribution of price movements. This one is a normal distribution and I assumed that the s.dev was 3%, which is a typical number for daily price movements in financial markets. My boss used this to make some decisions, and was quite happy. We made millions from the tiny everyday price fluctuations and trades.
  • 3. SHIT GOES WRONG SLIDE Today, however, we are fucked. Today is Black Monday, October 19, 1987 and the S&P drops by 21%. My boss freaks out, the firm is in financial ruin, my kids starve.
  • 4. How could this happen? Under my model, the probability of a 21% fluctuation is 10^-16, orā€¦ nonexistent. So what happened? Well, the distribution of price fluctuations actually has a fat tail. In fact, the mistake I made was using a normal distribution. Take a look at what happens if we use a power law distribution instead.
  • 5. Probability 0.9 0.99 0.999 10 NORMAL 3.8 7.0 9.2 21 POWER 2.8 7.8 38.5 almost 0 SOMEBODY SET UP US THE BOMB! Now, the chance of a 21% fluctuation is 0.08%, something that my risk model would certainly have included. And, would have certainly changed our behavior on the financial markets. The good news is most financial firms are aware of this phenomenon, and model accordingly (after a few massive failures). In info sec, weā€™re just not there yet.
  • 6. MOTHERF*RS SWANS ACT LIKE ā€Ø THEY FORGOT ā€Ø ABOUT Often, as Russell Thomas likes to point out, people mistake events that they did not predict for black swan events. However, ! What makes a "Black Swan event" is not the event itself. Ā Instead, it is how that event fits into the object-observer system. ! And in fact, the paradigm shift to using power law distributions to describe many of the variables we use in info sec explains away plenty of ā€œblack swansā€ - by making the object-observer system more receptive to rare, high impact events.
  • 7. THE POWER LAW(S) OF INFORMATION SECURITY @mroytman THE POWER LAW OF INFORMATION SECURITY But in fact, nothing is linear. This talk is about the power laws which occur in information security, what they mean, where iā€™ve found some, and what to do about them. The research iā€™ll present is far from done, but itā€™s a starting point and I hope to make you think twice before using a normal distribution in a model again.
  • 8. SLIDE WITH FRACTALS WHAT ARE POWER LAWS Power laws are distributions which describe scale-free phenomenon. What this means in lay manā€™s terms is that the same mechanism is at work across a range of scales, and orders of magnitudes. In fact, power laws are a necessary and sufficient condition for scale free phenomenon. The importance and ubiquity of scale free behavior was first pointed out by Mandlebrot, who coined the term ā€œfractalsā€. In fractals, we see the same behavior across different scales of length, time, price or any other relevant variable with a scale attached to it.
  • 9. A quantity is said to follow a power law if it is drawn from a probability distribution that looks like: P(x) ~ Cx^alpha ! alpha is a constant parameter of the distribution known as the exponent, or scaling parameter. typical scaling parameters are in the range 2-3, but there are exceptions.
  • 10. Lots of things follow a power law power law phenomenon. The oldest (1948) and cleanest statistical regularity in international relations is Richardson's law which states that the severity of warfare is power law distributed. This behavior is not unique to wars, and occurs in natural sciences (traffic jams, earthquakes, biodiversity, coastlines, brownian motion, asteroid impacts, etc) and social sciences (language, wealth, firm size, salaries, guild sizes in world of warcraft, links to blogs). These power laws are considered fingerprints of a "complex" system; although what exactly is meant by complex is transient. These systems generally produce outputs that are patterned, but have no standard(for lack of a better term) size in the Gaussian sense. More often than not, a power law only applies to the values of a distribution greater than some minimum x. In these cases, we say that the tail follows a power law.
  • 11. FAKE SWANS Tails are vitally important. A power law is an instance of a fat tailed distribution. There exist precise proofs that ā€œsufficiently fat tailsā€ == power law distributions. Measuring how fat a tail is, is actually quite difficult - The question of proving that something is or isnā€™t a power law, is often reduced to a question of ā€œjust how fat the tail isā€.
  • 12. You canā€™t tell the difference here, but when we go further outā€¦
  • 13. You can see how much smaller the tails of the non-power law distributions are.
  • 14. LACK OF PREDICTION Why does this matter? Itā€™s because when the tails are small, we can say meaningful things about the ā€œmeanā€ and varianceā€ of the distributions. With a power law distribution, the mean or variance donā€™t necessarily stay stable over time. ! An interest aspect of power laws is that the alpha exponent has a natural interpretation. It is the cutoff above which moments of the function do not exist. More familiarly, for exponents less than 2, the variance does not exist, and the central limit theorem does not apply. In effect, even with an infinite amount of data, we cannot say much about the variance of such functions. For exponents less than 1, the mean does not exist. For this reason there is no such thing as an ā€œaverage floodā€. There is instead a 100 year flood, a 10 year flood.
  • 15. Perhaps we ought to start talking about the target breach as a ā€œ10 year breachā€. ! But letā€™s get back to our own industry - why would information security exhibit power law behavior? And where?
  • 16. First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results stay power law distributed. ! Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect our own variables to inherit those power law properties.
  • 17. LAW 1 First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results stay power law distributed. ! Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect our own variables to inherit those power law properties.
  • 18. BREACH FREQUENCY BY CVE TYPE P(CVE has breach volume X) = X^-1.5 TheĀ Kolmogorovā€“Smirnov D-value: 0.1134174, xmin: 15, alpha: 1.5 ! The chance that a particular CVE has high breach volume is substantially higher than we previously thought, just like in the hutton example the chance that the S&P dropped by 21% was underestimated.
  • 19. ONE VULN WILL CAUSE YOUR BREACH (OR A COUPLE) What does this mean for you? It means there are vulnerabilities which have an extremely high probability of causing a breach. Since this breach data comes from how attackers are behaving, having a handle on threat intelligence globally allows you to identify _which_ vulnerabilities are those most likely to cause the breaches. ! It means shifting your strategy away from trying to fix everything, or even trying to fix everything that comes out on patch tuesday, and instead focusing on identifying and remediating the few vulnerabilities which are _most_ likely to cause a breach. THIS is non-linear thinking.
  • 20. LAW 2 First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results stay power law distributed. ! Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect our own variables to inherit those power law properties.
  • 21. Kevin Thormsonā€™s talk tomorrow at 2pm - This talk introduces the VERIS Community Database (VCDB), a research project aimed at gathering news articles about information security incidents, extracting data, and serving as a public repository of breach data suitable for analysis and research
  • 22. ID THEFT FREQUENCY P(Theft has X victims) = X^-0.7 beta 0.7+- 0.1 Malliart and Sornette, ETH Zurich 2009 (datalossdb). !
  • 23. STABLE ACROSS INDUSTRIES beta 0.7+- 0.1 Malliart and Sornette, ETH Zurich 2009 (datalossdb).
  • 24. ONE BREACH WILL MATTER MOST (OR A COUPLE) The takeaway here is that impact is concentrated in the fat tails of the distributions as well - it means we ought to be tailoring our strategies to preventing the one big breach. This also means thereā€™s no average breach, and estimates of potential losses need to plan for scenarios like the black friday that was missed in the opening example.
  • 25. LAW 3 First, when two distributions are combined, the fattest tail always wins. This means are you add in power law distributed factors to a distribution the results stay power law distributed. ! Second, Information Security is the combination of a great many factors - the size of the internet, the size of firms, the power of terrorist groups, and the distribution of wealth are just a few of the ones I can think of that are power law distributed. If each has an exogenous effect on infosec, we would expect our own variables to inherit those power law properties.
  • 26. BREACH FREQUENCY BY DAY P(Day has breach volume X) = X^-1.5 TheĀ Kolmogorovā€“Smirnov D-value: 0.1134174, xmin: 15, alpha: 1.5 !
  • 27. ONE DAY ITā€™LL HAPPEN TO YOU (OR A COUPLE)
  • 28. SLIDE WITH WHAT DO WE DO ABOUT IT From Russell: Handling Fat Tails for Decisionmakers ! Here's a list of things that analysts and decision makers can do to successfully cope with the unruliness of very fat tailed probability distributions: 1. To the method of frequentist statistical analysis of historical data, add other methods and other data. Ā Simulations, laboratory experiments, and subjective probability estimates by calibrated experts are just three alternative methods that can fill in for the limitations of frequentist methods with limited sample data. 2. Resist using colloquial terms like "average", "typical", "spread", or even "worst case". Ā Using them will only add to confusion, misunderstanding, and mis-set expectations. 3. Communicate and decide using quantiles, not the usually summary statistics mean, standard deviation, etc. Ā If any summary statistics are used as decision criteria or in models, use quantiles. 4. Put in some effort to estimate the "fatness" of the tail, either parametrically or non-parametrically. Ā Even a not-very-good fat tail model is much better than one based on thin tails. Ā There are ways to test how good the alternative models are. Ā  In my opinion, the best academic paper on this is "Power-law distributions in empirical data".
  • 29. You should model risk differently ! ! michael ! [8:21 AM] You should focus your efforts on identifying things that live in the fat tail or are predictors of it ! ! michael ! [8:22 AM] Bc there is no average ! ! michael ! [8:22 AM] you should never ever use metrics like average vulns closed or something like that 1. Investing to fix 100% of vulns is poor use of resources 2. When the Big Loss event happens, only one or a few vulnerabilities will be exploited 3. Ahead of that (ex ante), you need a systematic method to invest to fix a portfolio of vulns which, with very high confidence, include ALL of the vulns that could be part of the Big Loss event. Ā These vulns will be strategically positioned in the most likely attack graphs. 4. And hereā€™s how youā€™d do that in practice ...
  • 31. Dan Geer, Power. Law. http://geer.tinho.net/ieee/ieee.sp.geer.1201a.pdf Clauset et al. Power Law Distributions in Empirical Data http://arxiv.org/abs/0706.1062 Farmer and Geanokoplos, Power Laws in Economics and Elsewhere http://tuvalu.santafe.edu/~jdf/papers/powerlaw3.pdf Malliart and Sornette, Heavy-Tailed Distribution of Cyber Risks, http://arxiv.org/abs/ 0803.2256 poweRlaw R Package http://cran.r-project.org/web/packages/poweRlaw/vignettes/ poweRlaw.pdf Gabaix, Some Nondescript NYU Stern Lecture on Power Laws http://pages.stern.nyu.edu/ ~xgabaix/papers/powerLaws.pdf Russell Thomas for graphs and everything he writes on http:// exploringpossibilityspace.blogspot.com/ THANKS! and Alex Hutton