SlideShare a Scribd company logo
Building Intelligent Automatons
with Semantic Reasoning
Anton Goncharov
@ag0x00
BSides San Francisco
April 15 2018
Agenda
Who Am I?
What Is This?
A Bit of Perspective
Semantic Technology
Things, not Strings
Power of Ontologies
Real Intelligence with Reasoning
New Opportunities
Who Am I
Anton Goncharov, CISSP
20+ years Information Security
Management
12+ years Security Information
Management
Semantic Reasoning battle scars
My passion: data tells a story
https://linkedin.com/in/
securityservices/
https://twitter.com/ag0x00
What’s This About
A. Our current approach to InfoSec Management is broken
B. Semantic Reasoning can help
Day In Life of Security Analyst
Data ??? “Insights”
What’s In The Box?!!
Strongly Worded Statements
“Log Management” fails
volume and variety
Useless dashboards
Missing context
Unreliable detection
“Dumb” algorithms
Zombie workflows
Tribal knowledge
This whole “Security Log Analytics” approach sucks
Congrats. Now go investigate each IP address…
Pain
We Were Promised a Single Pane of Glass…
Our tools struggle to represent
the complexity of our environments.
Solution
Semantic Technologies to the Rescue
Information Architecture
Creation
Gathering
Presentation
Organization
Integration
Conversation
Data Information Knowledge
Experience
Context
Data Sources Cases, Tickets Incident Reports
Wikis
Source: http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
Semantic Technology
Capture and represent knowledge as a network of facts
Automatically make conclusions based on these facts
Fill gaps in information provided by data
Focus on problems of higher order
High level stack
SPARQL
RDF
RDFS
OWL
Triple Store Data Store
Data Model
Ontology / Semantics
Graph Query
Language
Brief Explanation of OWL and RDF
OWL2 is an ontology description language built on top of the Resource
Description Framework (RDF). RDF describes a way of storing data that is
different from the traditional table-based conception.
RDF data consists of triples, and only triples; each triple, called
a statement consists of a subject, predicate, and an object.
The subject represents a resource of some kind, the predicate a relation, and
the object can either be a literal value or another resource.
OWL2 and the RDF Schema (RDFS) define a set of resources and properties
that can be used to develop ontologies for RDF datasets.
Don’t Trust
Labels
{ “user” : “bob” }
Source: https://www.redbubble.com/people/souldroid/works/24128828-admins-of-the-galaxy
“Sure, but
which one?”
Object Based Processing (OBP)
Same ‘username’ label can refer to accounts on multiple hosts
with the same name (‘root’)
Thinking about everything as objects and relationships
between them is how we understand our world
Friend “George” vs an unknown friend who gambles, watches
QVC, buys a fancy litter box, does not own a cat
Which one is better described?
Defining Uniqueness
Q: So how do we know if two “things” are the same?
A: It depends:
In some cases (e.g. IP address), label is enough - 127.0.0.1 is the same address, even though it
might be used by every host
In some cases, not enough — like a person’s name.
Either look for unique identifier (like SSN or passport number), or
Use probabilistic approach and leverage known relationships.
For example, there’s probably only one John Smith that works at ‘Marketing', out of
‘London’ office, and reports to 'Bill Baker’. 
There is are many ‘eth0’ network interfaces, but only one on your host. 
The Power of Language
‘MYLAPTOP’
(host)
‘ACMEANTON’
(credential)
exists
on
Subject ObjectPredicate
“I can use domain account to log in to my laptop.”
Vertex VertexEdge
Event as a subgraph
Attempted
Authentication
(event)
‘MYLAPTOP’
(host)
‘ACMEANTON’
(credential)
‘PRDSERVER’
(host)
‘ANTON’
(auth token)
’10.0.0.1’
(ip address)
exists
on
initiated
by
initiated
from
uses
attempted
at
uses
Ontologies
Ontologies define the structure of knowledge for
various domains.
Why Use Ontology
Federates data in common language — search across domains
Facilitates reasoning — automate low level data analysis
Supports “analytic pivoting” — answer questions you didn’t
realize you had
Chains attack evidence — find parts of other attacks
Some useful concepts
1. Inheritance
2. Reverse edges
3. Axioms (reasoning rules) Employee
Person
DoB
DL #
DoB
DL #
Employee ID
Class
Subclass
Domain
Host
belongs to
contains
1.
2.
Hardware
Peripheral
Device
Printer
Mobile
Computer
Laptop Cellular Phone Desktop Server
Organization
Location
Has Vendor
Deployed At
Stationary
Computer
Computing
Machine
OWL Example
:UserAccount a owl:Class ;
rdfs:comment "an individual set of credentials."@en ;
rdfs:label “User Account”@en ;
rdfs:subClassOf owl:Thing .
:hasFullName
a owl:DatatypeProperty ;
rdfs:comment "and extended name or description, used only for display purposes"@en ;
rdfs:label "has full name"@en ;
rdfs:domain :UserAccount ;
rdfs:range xsd:string .
:memberOfGroup
a owl:ObjectProperty ;
rdfs:domain :UserAccount ;
rdfs:label "is member of Group"@en ;
rdfs:range :Group ;
Source: https://github.com/twosixlabs/icas-ontology
Existing Ontologies for Cybersecurity
By Mark Philpot:
https://github.com/daedafusion/cyber-ontology
Focuses on intelligence standards like CAPEC, STIX, CVE, etc.
Integrated Cyber Analysis System (ICAS), DARPA funded:
https://github.com/twosixlabs/icas-ontology
Healthy mix of intelligence feeds and internal environment objects
MITRE DFAX:
https://www.sciencedirect.com/science/article/pii/S1742287615000158
Built around CybOX
Focused on digital forensic investigations
Semantic
Reasoning
Semantic Reasoning I
1. Create a vertex or an edge that
must exist
Olaf
Ira
?
has uncle
has parent
has brother
?
Semantic Reasoning II
2. Promote a vertex or an edge
into a more specific subclass
Olaf
Ira
Bert
has uncle
has father
has brother
Male
Practical Example
installed on
Vulnerability
Software
Release
Software
Installation
Host
contains
instance of
vulnerable to
CVE-2018-2581
Oracle Java SE 9.0.1
/usr/lib/jvm/java-9
mybox.acme.org
Opportunities
Contextual Analytics — analyze facts instead of raw data
Clustering — “this host looks and acts a lot like Oracle DB
servers”
Outliers — “very unusual permissions for a salesperson
compared to the rest of the Sales team”
Similar Subgraphs — “this subgraph is an attack; find other
similar subgraphs”
Words of caution
• RDFS struggles with dynamic and temporal facts
A. Stick to property graphs
B. Express states as object
C. Make Edge a special Vertex class
D. Use GRAKN (https://grakn.ai)
• OWL ontologies can get complicated
• Use Turtle and visual editors (https://en.wikipedia.org/wiki/
Ontology_(information_science)#Editors)
• Continuously check grammar and dependencies
Parting Words
Semantic Web is not just for Google
anymore
You’re always dealing with Things
Judicious data modeling
Automate low level analysis
Manage knowledge
Stay in touch
Source: https://gizmodo.com/this-google-dream-bot-inspired-artwork-is-mind-blowing-1761049728
Thank You

More Related Content

What's hot

Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
Kamal Rathaur
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
Sudhanshu Chauhan
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
Megan DeBlois
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
Chandrapal Badshah
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet.
Shubham Mittal
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
Mats Björe
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
SV Ruby on Rails Meetup
 
Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"
Lviv Startup Club
 
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
MLconf
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
Chandrapal Badshah
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon roses
reconvillage
 

What's hot (11)

Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet.
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
 
Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"Malenko Аndrii "Security for AI"
Malenko Аndrii "Security for AI"
 
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017Talha Obaid, Email Security, Symantec at MLconf ATL 2017
Talha Obaid, Email Security, Symantec at MLconf ATL 2017
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon roses
 

Similar to 2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning

Repositories thru the looking glass
Repositories thru the looking glassRepositories thru the looking glass
Repositories thru the looking glass
Eduserv Foundation
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic Web
Barry Smith
 
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
Anastasija Nikiforova
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Vaticle
 
The LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked DataThe LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked Data
David Newbury
 
Content Repositories vs Knowledge Bases
Content Repositories vs Knowledge BasesContent Repositories vs Knowledge Bases
Content Repositories vs Knowledge Basesgokcebanu
 
State of the Semantic Web
State of the Semantic WebState of the Semantic Web
State of the Semantic Web
Ivan Herman
 
How to put an annotation in html
How to put an annotation in htmlHow to put an annotation in html
How to put an annotation in html
STIinnsbruck
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
Anton Chuvakin
 
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
NETWAYS
 
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
NETWAYS
 
Pentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar PaghdalPentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar Paghdal
NSConclave
 
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODOLinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
Chris Mungall
 
Introduction to Application Profiles
Introduction to Application ProfilesIntroduction to Application Profiles
Introduction to Application Profiles
Diane Hillmann
 
Semantic Web 2.0
Semantic Web 2.0Semantic Web 2.0
Semantic Web 2.0hchen1
 
Beyond Internet Scanning
Beyond Internet ScanningBeyond Internet Scanning
Beyond Internet Scanning
ssuser227f24
 
Sanderson Shout It Out: LOUD
Sanderson Shout It Out: LOUDSanderson Shout It Out: LOUD
OOP programming for engineering students
OOP programming for engineering studentsOOP programming for engineering students
OOP programming for engineering students
iaeronlineexm
 

Similar to 2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning (20)

Repositories thru the looking glass
Repositories thru the looking glassRepositories thru the looking glass
Repositories thru the looking glass
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic Web
 
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
 
The LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked DataThe LOD Gateway: Open Source Infrastructure for Linked Data
The LOD Gateway: Open Source Infrastructure for Linked Data
 
Content Repositories vs Knowledge Bases
Content Repositories vs Knowledge BasesContent Repositories vs Knowledge Bases
Content Repositories vs Knowledge Bases
 
State of the Semantic Web
State of the Semantic WebState of the Semantic Web
State of the Semantic Web
 
How to put an annotation in html
How to put an annotation in htmlHow to put an annotation in html
How to put an annotation in html
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
OSDC 2017 - Claus Matzinger - An Open Machine Data Analysis Srack with Docker...
 
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...OSDC 2017 |  An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
OSDC 2017 | An Open Machine Data Analysis Stack with Docker, CrateDB, and Gr...
 
Big Data Analytics V2
Big Data Analytics V2Big Data Analytics V2
Big Data Analytics V2
 
Pentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar PaghdalPentester's Mindset! - Ravikumar Paghdal
Pentester's Mindset! - Ravikumar Paghdal
 
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODOLinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
LinkML Intro July 2022.pptx PLEASE VIEW THIS ON ZENODO
 
Introduction to Application Profiles
Introduction to Application ProfilesIntroduction to Application Profiles
Introduction to Application Profiles
 
Semantic Web 2.0
Semantic Web 2.0Semantic Web 2.0
Semantic Web 2.0
 
Beyond Internet Scanning
Beyond Internet ScanningBeyond Internet Scanning
Beyond Internet Scanning
 
Sanderson Shout It Out: LOUD
Sanderson Shout It Out: LOUDSanderson Shout It Out: LOUD
Sanderson Shout It Out: LOUD
 
OOP programming for engineering students
OOP programming for engineering studentsOOP programming for engineering students
OOP programming for engineering students
 
Semantics
SemanticsSemantics
Semantics
 

Recently uploaded

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Subhajit Sahu
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 

Recently uploaded (20)

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTESAdjusting OpenMP PageRank : SHORT REPORT / NOTES
Adjusting OpenMP PageRank : SHORT REPORT / NOTES
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 

2018 BSidesSF Buiding Intelligent Automatons with Semantic Reasoning

  • 1. Building Intelligent Automatons with Semantic Reasoning Anton Goncharov @ag0x00 BSides San Francisco April 15 2018
  • 2. Agenda Who Am I? What Is This? A Bit of Perspective Semantic Technology Things, not Strings Power of Ontologies Real Intelligence with Reasoning New Opportunities
  • 3. Who Am I Anton Goncharov, CISSP 20+ years Information Security Management 12+ years Security Information Management Semantic Reasoning battle scars My passion: data tells a story https://linkedin.com/in/ securityservices/ https://twitter.com/ag0x00
  • 4. What’s This About A. Our current approach to InfoSec Management is broken B. Semantic Reasoning can help
  • 5. Day In Life of Security Analyst
  • 7. Strongly Worded Statements “Log Management” fails volume and variety Useless dashboards Missing context Unreliable detection “Dumb” algorithms Zombie workflows Tribal knowledge This whole “Security Log Analytics” approach sucks
  • 8. Congrats. Now go investigate each IP address…
  • 9. Pain We Were Promised a Single Pane of Glass…
  • 10. Our tools struggle to represent the complexity of our environments.
  • 12. Information Architecture Creation Gathering Presentation Organization Integration Conversation Data Information Knowledge Experience Context Data Sources Cases, Tickets Incident Reports Wikis Source: http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
  • 13. Semantic Technology Capture and represent knowledge as a network of facts Automatically make conclusions based on these facts Fill gaps in information provided by data Focus on problems of higher order
  • 14. High level stack SPARQL RDF RDFS OWL Triple Store Data Store Data Model Ontology / Semantics Graph Query Language
  • 15. Brief Explanation of OWL and RDF OWL2 is an ontology description language built on top of the Resource Description Framework (RDF). RDF describes a way of storing data that is different from the traditional table-based conception. RDF data consists of triples, and only triples; each triple, called a statement consists of a subject, predicate, and an object. The subject represents a resource of some kind, the predicate a relation, and the object can either be a literal value or another resource. OWL2 and the RDF Schema (RDFS) define a set of resources and properties that can be used to develop ontologies for RDF datasets.
  • 18. Object Based Processing (OBP) Same ‘username’ label can refer to accounts on multiple hosts with the same name (‘root’) Thinking about everything as objects and relationships between them is how we understand our world Friend “George” vs an unknown friend who gambles, watches QVC, buys a fancy litter box, does not own a cat Which one is better described?
  • 19. Defining Uniqueness Q: So how do we know if two “things” are the same? A: It depends: In some cases (e.g. IP address), label is enough - 127.0.0.1 is the same address, even though it might be used by every host In some cases, not enough — like a person’s name. Either look for unique identifier (like SSN or passport number), or Use probabilistic approach and leverage known relationships. For example, there’s probably only one John Smith that works at ‘Marketing', out of ‘London’ office, and reports to 'Bill Baker’.  There is are many ‘eth0’ network interfaces, but only one on your host. 
  • 20. The Power of Language ‘MYLAPTOP’ (host) ‘ACMEANTON’ (credential) exists on Subject ObjectPredicate “I can use domain account to log in to my laptop.” Vertex VertexEdge
  • 21. Event as a subgraph Attempted Authentication (event) ‘MYLAPTOP’ (host) ‘ACMEANTON’ (credential) ‘PRDSERVER’ (host) ‘ANTON’ (auth token) ’10.0.0.1’ (ip address) exists on initiated by initiated from uses attempted at uses
  • 22. Ontologies Ontologies define the structure of knowledge for various domains.
  • 23. Why Use Ontology Federates data in common language — search across domains Facilitates reasoning — automate low level data analysis Supports “analytic pivoting” — answer questions you didn’t realize you had Chains attack evidence — find parts of other attacks
  • 24. Some useful concepts 1. Inheritance 2. Reverse edges 3. Axioms (reasoning rules) Employee Person DoB DL # DoB DL # Employee ID Class Subclass Domain Host belongs to contains 1. 2.
  • 25. Hardware Peripheral Device Printer Mobile Computer Laptop Cellular Phone Desktop Server Organization Location Has Vendor Deployed At Stationary Computer Computing Machine
  • 26. OWL Example :UserAccount a owl:Class ; rdfs:comment "an individual set of credentials."@en ; rdfs:label “User Account”@en ; rdfs:subClassOf owl:Thing . :hasFullName a owl:DatatypeProperty ; rdfs:comment "and extended name or description, used only for display purposes"@en ; rdfs:label "has full name"@en ; rdfs:domain :UserAccount ; rdfs:range xsd:string . :memberOfGroup a owl:ObjectProperty ; rdfs:domain :UserAccount ; rdfs:label "is member of Group"@en ; rdfs:range :Group ; Source: https://github.com/twosixlabs/icas-ontology
  • 27. Existing Ontologies for Cybersecurity By Mark Philpot: https://github.com/daedafusion/cyber-ontology Focuses on intelligence standards like CAPEC, STIX, CVE, etc. Integrated Cyber Analysis System (ICAS), DARPA funded: https://github.com/twosixlabs/icas-ontology Healthy mix of intelligence feeds and internal environment objects MITRE DFAX: https://www.sciencedirect.com/science/article/pii/S1742287615000158 Built around CybOX Focused on digital forensic investigations
  • 29. Semantic Reasoning I 1. Create a vertex or an edge that must exist Olaf Ira ? has uncle has parent has brother
  • 30. ? Semantic Reasoning II 2. Promote a vertex or an edge into a more specific subclass Olaf Ira Bert has uncle has father has brother Male
  • 31. Practical Example installed on Vulnerability Software Release Software Installation Host contains instance of vulnerable to CVE-2018-2581 Oracle Java SE 9.0.1 /usr/lib/jvm/java-9 mybox.acme.org
  • 32. Opportunities Contextual Analytics — analyze facts instead of raw data Clustering — “this host looks and acts a lot like Oracle DB servers” Outliers — “very unusual permissions for a salesperson compared to the rest of the Sales team” Similar Subgraphs — “this subgraph is an attack; find other similar subgraphs”
  • 33. Words of caution • RDFS struggles with dynamic and temporal facts A. Stick to property graphs B. Express states as object C. Make Edge a special Vertex class D. Use GRAKN (https://grakn.ai) • OWL ontologies can get complicated • Use Turtle and visual editors (https://en.wikipedia.org/wiki/ Ontology_(information_science)#Editors) • Continuously check grammar and dependencies
  • 34. Parting Words Semantic Web is not just for Google anymore You’re always dealing with Things Judicious data modeling Automate low level analysis Manage knowledge Stay in touch Source: https://gizmodo.com/this-google-dream-bot-inspired-artwork-is-mind-blowing-1761049728