SlideShare a Scribd company logo
Cyber-Attack Forecasting:
A Proactive Approach to Defensive Cyberwarfare
Malachi Jones, PhD
Cyber Security Technologist
About Me(Cyber-security Background)
4
• Georgia Tech (2007-2013)
– Security research collaboration between Georgia Tech (GT) and University of
California Santa Barbara (UCSB)
– PhD thesis topic: “Cyber-Attack Forecasting” [1]
• Harris Corporation (2013 – Present)
– (2014) Crypto-system software development and security consultant
– (2015) Cyber Security Vulnerability Researcher
Giovanni Vigna, PhD
Security Researcher
Joao Hespana, PhD
Game Theorist
Jeff Shamma, PhD
Game Theorist
Georgios Kotsalis, PhD
Game Theorist
Malachi Jones, PhD
Security Researcher
Outline
5
• Motivation: Reactive vs. Proactive
• Background
– Game Theory
– Machine Learning
• Cyber-Attack Forecasting
– Modeling a Cyber System
– Analyzing the Model
• Conclusion
• Questions
• Additional Resources
Motivation: Reactive vs Proactive
• Reactive Security
– Backward looking: Addressing
yesterday’s security threats today
– Status quo in Cyber-Security
Community
– Effective against novice hackers
– Inadequate for
• Advanced Persistent Threats (APTs)
• Sophisticated cyberweapons
Teen Hacker in Basement
State Sponsored Hacking
Motivation: Reactive vs Proactive
• Reactive Cyber-Security Process
Hacker
Develops New
Technique
Technique
tested against
security
systems
Technique
adopted by
other hackers
Security
community
eventually
responds
Motivation: Proactive Approach (Healthcare)
• Forecasting Infections/diseases
– Reliably Predict the next outbreak
of an infection or disease
– Learn/Estimate the capabilities of
the disease (i.e. Highly contagious)
– Proactive Countermeasures
• Provide vaccinations
• Quarantine infected individuals
• Set up medical facilities near
areas where outbreak likely to be
worst
Motivation: Proactive Approach (Cyber Security)
• Forecasting a cyber attack
– Reliably predict a cyber-attack
– Learn/estimate attacker and/or
malware capabilities
– Launch proactive countermeasures
• Take infected systems offline
• Scrub and reinstall system
• Repressive actions (i.e. sandbox
databases/datastores)
• Perform more invasive “checkups” on
systems likely to be infected
Motivation: Cyber Attack Forecasting
• Forecasting Challenges
– Modeling attacker and cyber system in
an analytical framework
– Computational complexity of analyzing
model to predict future attacks
Background: Game Theory
• Cyber Security
– At least two decision makers (i.e. Cyber
Defender and Attacker)
– Want to predict likely behavior of attacker
– Objective to make “good” decisions to
defend against cyber-attacks
• Game Theory
– Mathematical decision framework
– Provides methods to analyze interactions
among decision makers
– Can allow us to predict the likely actions
of an adversary and recommend
appropriate actions for the defender
Background: Game Theory
• Prisoner‟s Dilemma
– Police arrest two suspects
– Suspects interrogated in separate rooms
– Each suspect can choose an action:
• Cooperate: Stay silent (Not Guilty)
• Defect: Confess and “rat out” the other
suspect (Guilty)
• Analysis of likely behavior of decision maker
– Best outcome for the group is to Cooperate
– Best outcome for the individual is to Defect and rat
out the other person
– Outcome is defect for each decision maker
2,2 5,1
1,5 3,3
C D
D
C
Background: Machine Learning
• Machine Learning:
– Discovering/learning from patterns in
collected data
– Can be useful to group „like‟ objects
• Hierarchical Clustering
– Clusters are a group of „like‟ objects
– Builds a hierarchy of clusters
• Agglomerative Clustering
– Bottom up approach to building cluster
– Initially, each object is its own cluster
– Pairs of clusters are merged based on
„likeness‟
– Performance: O(n2)
Example of Agglomerative Clustering
Actionable Cyber-Attack Forecasting
14
• Two components of forecasting we will focus on:
Analyzing the Model Using
Game Theoretic Methods
Modeling a Cyber System
Actionable Cyber-Attack Forecasting
15
Analyzing the Model Using
Game Theoretic Methods
Modeling a Cyber System
Modeling a Cyber System: A Simple Model
16
• Decision makers: Defender and Attacker
• Actions
– Defender: Rate (xi) to check up on the cyber-health of Host hi
– Attacker: Rate (yi) to attack (e.g. exfiltrate info) from Host hi
• Utility function for Host hi:
where is the cyber-health of hi
• Global Utility:
• Defender objective: Maximize the global utility function
• Zero-sum assumption: Attacker objective inverse of defender
,
Modeling a Cyber System: A Simple Model
17
• A closer inspection of the local utility function of host hi:
• Feasible constraints on the parameters:
• How do we obtain the following information to input into utility function?
– Cyber health of a node
– Parameters: cinfo, rdetect , and cprobe
Information leakage cost.
Cost for probing that includes
bandwidth and processing
Reward for detecting malware
and/or a cyber-attack
Estimating Cyber Health: High Level Overview
18
• Machine Learning:
– Use agglomerative clustering algorithm to cluster hosts based on the similarity of
the top 10 active processes with respect to CPU time
– Caution: We need to protect against malicious clusters from forming. We don‟t
want a subset of bad nodes to form their own cluster
– Example stopping criteria to help prevent malicious clusters:
– Since we are using hierarchical clustering, the algorithm will terminate once all
clusters are at least the minimum cluster size
Estimating Cyber Health: High Level Overview
19
• Anomaly Detection:
– Let the health of a node be a function of how far away it is from the center of
mass of its assigned cluster
– Example:
• Let Pi be the set of processes running on host hi
• We will measure the similarity of nodes i and j by using the Jaccard index as follows
below:
• Let be the set of processes that are at least on 75% of machines in the cluster
that host hi is in
• Then
Estimating Utility Function Parameters
20
• Information leakage cost for host hi
– We can borrow an idea from sophisticated cyperweapons like Regin
– Assign higher costs to hosts that are accessed by people that have higher
privileges in an organization (IT admins, CEO, CTO, etc…)
• Probing cost for host hi
– Another idea borrowed from sophisticated malware
– Self monitor process cpu/memory/bandwidth usage at different probe rates to
derive costs for each host
• Reward for detecting malware
– Determine organizations attribution risk appetite for unknowingly hosting
botnets/zombies
– The reward can be proportionate to the resources available for use on a host by
a botmaster and/or hacker
Actionable Cyber-Attack Forecasting
21
Analyzing the Model Using
Game Theoretic Methods
Modeling a Cyber System
• Suppose the following:
– Defender: Actions are always probe and never probe (i.e. xi = 1 or xi = 0)
– Attacker : Actions are always attack and never attack (i.e. yi= 1 or xi = 0)
• The zero-sum 2X2 matrix game representation for host hi
Analysis with Game Theory
22
NA
P
A
NP
P
NP
NAA
....
P
NP
NAA
Analysis with Game Theory
23
• Formulation of game as a general optimization problem:
where s* is the optimal mixed strategy for the defender
• Note: s* is the probability that the defender should always probe
• Key Point: This problem can be formulated as a linear program, which
is computationally more efficient
• Linear Programming Formulation:
Conclusion: Q&A
• Can you really forecast a cyber attack in a real, non-trivial system?
– Yes…Forecasting isn‟t necessarily binary (i.e. either it will happen or not happen)
– The predictiveness can be about intensity/frequency/distribution of an attack in a
system (e.g. Will it get worse? How often will it occur? Where will it spread next? )
– Example: I have a cough. Will this turn into a flu? Can it spread to others?
– All models are wrong, but some models can be useful
• How far in advance could you predict an attack (Lead-time)?
– You don‟t have to predict an event days or weeks in advance for the prediction to
be useful
– Even a 20 minute warning could be the difference between 1,000 users sensitive
information being exfiltrated and 1,000,0000
24
Conclusion: Q&A
• If you can forecast, what approaches/methodologies will you use to
predict cyber attacks in a real world system?
– Machine Learning: Hierarchical clustering of groups of hosts in a system based
on the similarity of processes/services running on each host
– Anomaly Detection: Amongst hosts in a cluster, determining which hosts
behaviors are significantly different and deriving cyber-health for each host
– Game Theory: Mathematical decision framework that can allow us to predict the
likely actions of an adversary and recommend appropriate action for the defender
• What are examples of „actionable‟ decisions in the context of a
defender of a cyber system?
– Probing frequency/intensity: How often should we „check up‟ on a host and how
invasive should the checkup be?
– Should a host stay online, be taken offline, or wiped and reinstalled
25
Conclusion: Q&A
• Are there any connections with healthcare (i.e. modeling/forecasting
infectious diseases like malaria and ebola)?
– There may be a lot of ideas from the medical field that we can borrow that are
relevant and useful in predicting/detecting/treating cyber infections.
– Example: When you go to the doctor for a checkup, they compare your vitals (i.e.
blood pressure, pulse, and body temperature) to what is „normal‟ for someone in
your respective demographic
– We explicitly borrow this concept of deriving cyber-health of a node based on what
is „normal‟ for the cluster.
26
Questions?
27
Additional Resources
28
1. M. Jones, G. Kotsalis, and J. Shamma, “Cyber-attack forecast modeling and
complexity reduction using a game-theoretic framework,” in Control of Cyber-
Physical Systems (D. C. Tarraf, ed.), vol. 449 of Lecture Notes in Control and
Information Sciences, pp. 65–84, Springer International Publishing, 2013.
2. Singer, P.W. & Friedman, A. (2014). Cybersecurity: What Everyone Needs to
Know. OUP USA.
3. Zetter, Kim (2014). Countdown to Zero Day: Stuxnet and the Launch of the
World's First Digital Weapon. Crown Publishing Group
4. Jacobs, Jay & Rudis, Bob (2014). Data-Driven Security: Analysis,
Visualization and Dashboards. Wiley Publishing
5. Kleidermacher, D. & Kleidermacher, M. (2012). Embedded Systems Security:
Practical Methods for Safe and Secure Software and Systems Development.
Additional Resources
29
6. Ferguson, Niels, Schneier, Bruce & Kohno, Tadayoshi (2010). Cryptography
Engineering: Design Principles and Practical Applications. Wiley Publishing
7. Gebotys, C.H. (2009). Security in Embedded Devices. Springer
8. Anderson, R., "Why information security is hard - an economic perspective,"
Computer Security Applications Conference, 2001. ACSAC 2001.
Proceedings 17th Annual , vol., no., pp.358,365, 10-14 Dec. 2001

More Related Content

What's hot

TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Rod Soto
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
FRSecure
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
Demetrio Milea
 
Strata 2015 Presentation -- Detecting Lateral Movement
Strata 2015 Presentation -- Detecting Lateral Movement Strata 2015 Presentation -- Detecting Lateral Movement
Strata 2015 Presentation -- Detecting Lateral Movement
Ram Shankar Siva Kumar
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
madunix
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
Charles Guillemet
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
FFRI, Inc.
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
Informatik-Forum Stuttgart e.V.
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
FFRI, Inc.
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
Raghav S
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
FRSecure
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Rahul Mohandas
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
Infocyte
 

What's hot (20)

TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
Strata 2015 Presentation -- Detecting Lateral Movement
Strata 2015 Presentation -- Detecting Lateral Movement Strata 2015 Presentation -- Detecting Lateral Movement
Strata 2015 Presentation -- Detecting Lateral Movement
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 

Viewers also liked

Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
codefortomorrow
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
Icomm Technologies
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 

Viewers also liked (7)

Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 

Similar to Cyber_Attack_Forecasting_Jones_2015

Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
Kelly Shortridge
 
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
Andrea Montemaggio
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
Nasir Bhutta
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6Rod Soto
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Danny Akacki
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
satonaka3
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
Norman Johnson
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
Nigam Dave
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Mahdi_Fahmideh
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
RahmaSallam
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
ssuserfb92ae
 
Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)
Stephen Larroque
 

Similar to Cyber_Attack_Forecasting_Jones_2015 (20)

Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)
 

Cyber_Attack_Forecasting_Jones_2015

  • 1. Cyber-Attack Forecasting: A Proactive Approach to Defensive Cyberwarfare Malachi Jones, PhD Cyber Security Technologist
  • 2. About Me(Cyber-security Background) 4 • Georgia Tech (2007-2013) – Security research collaboration between Georgia Tech (GT) and University of California Santa Barbara (UCSB) – PhD thesis topic: “Cyber-Attack Forecasting” [1] • Harris Corporation (2013 – Present) – (2014) Crypto-system software development and security consultant – (2015) Cyber Security Vulnerability Researcher Giovanni Vigna, PhD Security Researcher Joao Hespana, PhD Game Theorist Jeff Shamma, PhD Game Theorist Georgios Kotsalis, PhD Game Theorist Malachi Jones, PhD Security Researcher
  • 3. Outline 5 • Motivation: Reactive vs. Proactive • Background – Game Theory – Machine Learning • Cyber-Attack Forecasting – Modeling a Cyber System – Analyzing the Model • Conclusion • Questions • Additional Resources
  • 4. Motivation: Reactive vs Proactive • Reactive Security – Backward looking: Addressing yesterday’s security threats today – Status quo in Cyber-Security Community – Effective against novice hackers – Inadequate for • Advanced Persistent Threats (APTs) • Sophisticated cyberweapons Teen Hacker in Basement State Sponsored Hacking
  • 5. Motivation: Reactive vs Proactive • Reactive Cyber-Security Process Hacker Develops New Technique Technique tested against security systems Technique adopted by other hackers Security community eventually responds
  • 6. Motivation: Proactive Approach (Healthcare) • Forecasting Infections/diseases – Reliably Predict the next outbreak of an infection or disease – Learn/Estimate the capabilities of the disease (i.e. Highly contagious) – Proactive Countermeasures • Provide vaccinations • Quarantine infected individuals • Set up medical facilities near areas where outbreak likely to be worst
  • 7. Motivation: Proactive Approach (Cyber Security) • Forecasting a cyber attack – Reliably predict a cyber-attack – Learn/estimate attacker and/or malware capabilities – Launch proactive countermeasures • Take infected systems offline • Scrub and reinstall system • Repressive actions (i.e. sandbox databases/datastores) • Perform more invasive “checkups” on systems likely to be infected
  • 8. Motivation: Cyber Attack Forecasting • Forecasting Challenges – Modeling attacker and cyber system in an analytical framework – Computational complexity of analyzing model to predict future attacks
  • 9. Background: Game Theory • Cyber Security – At least two decision makers (i.e. Cyber Defender and Attacker) – Want to predict likely behavior of attacker – Objective to make “good” decisions to defend against cyber-attacks • Game Theory – Mathematical decision framework – Provides methods to analyze interactions among decision makers – Can allow us to predict the likely actions of an adversary and recommend appropriate actions for the defender
  • 10. Background: Game Theory • Prisoner‟s Dilemma – Police arrest two suspects – Suspects interrogated in separate rooms – Each suspect can choose an action: • Cooperate: Stay silent (Not Guilty) • Defect: Confess and “rat out” the other suspect (Guilty) • Analysis of likely behavior of decision maker – Best outcome for the group is to Cooperate – Best outcome for the individual is to Defect and rat out the other person – Outcome is defect for each decision maker 2,2 5,1 1,5 3,3 C D D C
  • 11. Background: Machine Learning • Machine Learning: – Discovering/learning from patterns in collected data – Can be useful to group „like‟ objects • Hierarchical Clustering – Clusters are a group of „like‟ objects – Builds a hierarchy of clusters • Agglomerative Clustering – Bottom up approach to building cluster – Initially, each object is its own cluster – Pairs of clusters are merged based on „likeness‟ – Performance: O(n2) Example of Agglomerative Clustering
  • 12. Actionable Cyber-Attack Forecasting 14 • Two components of forecasting we will focus on: Analyzing the Model Using Game Theoretic Methods Modeling a Cyber System
  • 13. Actionable Cyber-Attack Forecasting 15 Analyzing the Model Using Game Theoretic Methods Modeling a Cyber System
  • 14. Modeling a Cyber System: A Simple Model 16 • Decision makers: Defender and Attacker • Actions – Defender: Rate (xi) to check up on the cyber-health of Host hi – Attacker: Rate (yi) to attack (e.g. exfiltrate info) from Host hi • Utility function for Host hi: where is the cyber-health of hi • Global Utility: • Defender objective: Maximize the global utility function • Zero-sum assumption: Attacker objective inverse of defender ,
  • 15. Modeling a Cyber System: A Simple Model 17 • A closer inspection of the local utility function of host hi: • Feasible constraints on the parameters: • How do we obtain the following information to input into utility function? – Cyber health of a node – Parameters: cinfo, rdetect , and cprobe Information leakage cost. Cost for probing that includes bandwidth and processing Reward for detecting malware and/or a cyber-attack
  • 16. Estimating Cyber Health: High Level Overview 18 • Machine Learning: – Use agglomerative clustering algorithm to cluster hosts based on the similarity of the top 10 active processes with respect to CPU time – Caution: We need to protect against malicious clusters from forming. We don‟t want a subset of bad nodes to form their own cluster – Example stopping criteria to help prevent malicious clusters: – Since we are using hierarchical clustering, the algorithm will terminate once all clusters are at least the minimum cluster size
  • 17. Estimating Cyber Health: High Level Overview 19 • Anomaly Detection: – Let the health of a node be a function of how far away it is from the center of mass of its assigned cluster – Example: • Let Pi be the set of processes running on host hi • We will measure the similarity of nodes i and j by using the Jaccard index as follows below: • Let be the set of processes that are at least on 75% of machines in the cluster that host hi is in • Then
  • 18. Estimating Utility Function Parameters 20 • Information leakage cost for host hi – We can borrow an idea from sophisticated cyperweapons like Regin – Assign higher costs to hosts that are accessed by people that have higher privileges in an organization (IT admins, CEO, CTO, etc…) • Probing cost for host hi – Another idea borrowed from sophisticated malware – Self monitor process cpu/memory/bandwidth usage at different probe rates to derive costs for each host • Reward for detecting malware – Determine organizations attribution risk appetite for unknowingly hosting botnets/zombies – The reward can be proportionate to the resources available for use on a host by a botmaster and/or hacker
  • 19. Actionable Cyber-Attack Forecasting 21 Analyzing the Model Using Game Theoretic Methods Modeling a Cyber System
  • 20. • Suppose the following: – Defender: Actions are always probe and never probe (i.e. xi = 1 or xi = 0) – Attacker : Actions are always attack and never attack (i.e. yi= 1 or xi = 0) • The zero-sum 2X2 matrix game representation for host hi Analysis with Game Theory 22 NA P A NP P NP NAA .... P NP NAA
  • 21. Analysis with Game Theory 23 • Formulation of game as a general optimization problem: where s* is the optimal mixed strategy for the defender • Note: s* is the probability that the defender should always probe • Key Point: This problem can be formulated as a linear program, which is computationally more efficient • Linear Programming Formulation:
  • 22. Conclusion: Q&A • Can you really forecast a cyber attack in a real, non-trivial system? – Yes…Forecasting isn‟t necessarily binary (i.e. either it will happen or not happen) – The predictiveness can be about intensity/frequency/distribution of an attack in a system (e.g. Will it get worse? How often will it occur? Where will it spread next? ) – Example: I have a cough. Will this turn into a flu? Can it spread to others? – All models are wrong, but some models can be useful • How far in advance could you predict an attack (Lead-time)? – You don‟t have to predict an event days or weeks in advance for the prediction to be useful – Even a 20 minute warning could be the difference between 1,000 users sensitive information being exfiltrated and 1,000,0000 24
  • 23. Conclusion: Q&A • If you can forecast, what approaches/methodologies will you use to predict cyber attacks in a real world system? – Machine Learning: Hierarchical clustering of groups of hosts in a system based on the similarity of processes/services running on each host – Anomaly Detection: Amongst hosts in a cluster, determining which hosts behaviors are significantly different and deriving cyber-health for each host – Game Theory: Mathematical decision framework that can allow us to predict the likely actions of an adversary and recommend appropriate action for the defender • What are examples of „actionable‟ decisions in the context of a defender of a cyber system? – Probing frequency/intensity: How often should we „check up‟ on a host and how invasive should the checkup be? – Should a host stay online, be taken offline, or wiped and reinstalled 25
  • 24. Conclusion: Q&A • Are there any connections with healthcare (i.e. modeling/forecasting infectious diseases like malaria and ebola)? – There may be a lot of ideas from the medical field that we can borrow that are relevant and useful in predicting/detecting/treating cyber infections. – Example: When you go to the doctor for a checkup, they compare your vitals (i.e. blood pressure, pulse, and body temperature) to what is „normal‟ for someone in your respective demographic – We explicitly borrow this concept of deriving cyber-health of a node based on what is „normal‟ for the cluster. 26
  • 26. Additional Resources 28 1. M. Jones, G. Kotsalis, and J. Shamma, “Cyber-attack forecast modeling and complexity reduction using a game-theoretic framework,” in Control of Cyber- Physical Systems (D. C. Tarraf, ed.), vol. 449 of Lecture Notes in Control and Information Sciences, pp. 65–84, Springer International Publishing, 2013. 2. Singer, P.W. & Friedman, A. (2014). Cybersecurity: What Everyone Needs to Know. OUP USA. 3. Zetter, Kim (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group 4. Jacobs, Jay & Rudis, Bob (2014). Data-Driven Security: Analysis, Visualization and Dashboards. Wiley Publishing 5. Kleidermacher, D. & Kleidermacher, M. (2012). Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development.
  • 27. Additional Resources 29 6. Ferguson, Niels, Schneier, Bruce & Kohno, Tadayoshi (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing 7. Gebotys, C.H. (2009). Security in Embedded Devices. Springer 8. Anderson, R., "Why information security is hard - an economic perspective," Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual , vol., no., pp.358,365, 10-14 Dec. 2001