cysis cyber-socio intelligent systems laboratory making smart decisions in cyber and information war...

Post on 19-Jan-2016

213 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

CySISCyber-Socio Intelligent SystemsLaboratory

Making Smart Decisions in Cyber and Information War

Paulo ShakarianArizona State University

Tempe, AZ

shak@asu.edu

CySIS

Russian Cyber-Warfare

Estonia (2007): Massive hacktivist DDoS

Georgia (2008): Botnet driven DDoS followed by hacktivist DDoS for the purpose of silencing news media and government sites

LiveJournal (2011): Massive DDoS attacks by the Optima botnet to silence anti-Putin journalism

CySIS

2014 Russian Cyber-warfare in Ukraine and Crimeia• Small-scale cyber attacks by independent hacking groups

• Some disruption of communication networks between Crimea and Ukraine by conventional forces

• Ukraine parilaiment member phones hacked, and Ukraine gov’t website down for 72 hours

• Sandworm Cyber-Espionage platform (discovered Oct. 2014)

• No large denial of service on the scale of Estonia, Georgia, or LiveJournal

• Where are the big DDoS attacks?

CySISMilitary-political, economic, [and] informational competition does not subside but grows in the world.

Vladimir Putin, Dec. 2013

CySIS

Social Media Tactics• Recruitment of Trolls to increase pro-Kremlin opinion in social

media• Paid to post ~100 comments a day on social media and major news

media articles• Generally write provocative messages to disrupt normal conversation on a

message

• Pro-Russian social media accounts• “Polite People” features Russian Army personnel as respectful to local

population

• Recruitment for fighters in East Ukraine• Narratives stressing religious commonality between Ukraine and

Russia and vilifying the West• Deliberate false information

• Information operation used to disrupt and delay counter-information campaigns

CySIS 6

MH-17 Disinformation

Militia claims “Only dead bodies were aboard the plane”

“Spanish air traffic controller” working in Ukraine blames Ukraine military for the attack

Putin immediately blames Ukrainian military for the incident.

All highly-disseminated

All false

CySIS

Early Identification• Can we identify viral cascades before they go viral?

• Two queries:• Size-based: If we observe a cascade that has m number of

participants, can we predict if it will grow to size T or greater?

• Time-based: If we observe a cascade that has occurred for t time periods, can we predict if it will grow to size T or greater?

• Ideally, we would prefer to set T to be an order-of-magnitude greater than the current observation.

CySIS

Large Cascades are Rare

Our study on a Sina Weibo dataset (17.9M users, 22M Tweets) confirmed the previously-observed power-law relationship between cascade size and frequency

Hence, when viewed as a classification problem, the classes are highly imbalanced

CySIS

Structural Diversity

• An individual adopts behavior based on the fraction of circles he is associated with that previously adopt.

• Inspired by real-world results of Ugander et al. 2012.

• Allows for additional information to be considered (i.e. geography, culture, etc.).

A

B

Intuition: Leverage structural-diversity based measures that are derived from the subgraph of the initial number of adopters.

CySIS

Viral Classification

• Our method (feature set Am) significantly outperformed previously published best results (Bm) and baseline time-based features (Cm).

Size-Based Time-Based

CySIS

Viral Classification (Size-Based)

• Our were generally more stable when used to predict cascades of greater sizes

• By varying the training threshold (and maintaining the definition of “viral” for classification) we could trade precision for recall.

Stability Precision vs. Recall

CySIS

Power Grid Cascading Failure

T

D

G G G G G

T T T

D D D DDD

The power grid is heterogeneous – meaning large scale reconnaissance is difficult. However, to cause a cascade, the adversary may need to recon and attack only a small portion of the power grid.

CySIS

The Model

The Attacker conducts cyber-attacks against power grid infrastructure IT systems to disable certain substations that lead to a cascading failure.

The Defender can harden a limited number of systems to prevent the attacker from causing them to fail.

CySIS

Technical PreliminariesPower grid network:

Source and load nodes:

Edge load:

Failure Operator (applied iteratively):

Payoff function (zero-sum game):

CySIS

Approach• Deterministic Best-Response: To deal with NP-

hardness (in most cases), we utilized a greedy heuristic

• Minimax (Mixed) Strategy: Leveraged double-oracle algorithm (provides exact solution with oracles to best response) using greedy algorithms for oracles

• Deterministic Load-Based: From the physics literature, based on a definition of load applied to nodes.

CySIS

Experimental Evaluation

Dataset: An Italian 380kV power transmission grid. • 310 nodes, 113 were source, 96 were load, and the

remainder were transmission nodes• The nodes were connected with 361 edges representing

the power lines

All experiments were run on a server with• An Intel X5677 Xeon Processor, 3.46 , a 12 MB Cache • 288 GB of physical memory • Hat Enterprise Linux version 6.1

CySIS

Defense Against the Attacker’s Minimax Strategy

1 2 3 4 5 60

10

20

30

40

50

60

70

80

90

Resources (ka=kd)

Ex

pe

cte

d P

ay

off

(D

isc

on

ne

cte

d N

od

es

)

CySIS

Defense Against the Attacker’s Best Response to DLB

1 2 3 4 5 60

102030405060708090

100

Resources (ka=kd)

Expe

cted

Pay

off

(Dis

conn

ecte

d N

odes

)

CySIS

Analysis of Attack Positions

0 2 4 6 8 10 1205

101520253035404550

Load

Dis

co

nn

ec

ted

No

de

s

Low-load / high-payoff!!

CySIS

Cyber Adversarial Intent• Conducting malware forensics is a time-consuming task

for an analyst – even with a malware sandbox:

A [automated] sandbox cannot tell you what malware does. It may report basic functionality, but it cannot tell you that the

malware is a custom Security Accounts Manager (SAM), hash dump utility, or an encrypted keylogging backdoor, for example. Those are conclusions that you must draw on your own.

Practical Malware Analysis

• Can we quickly infer a set of malware tasks from attributes observed in a sandbox run?

Key takeaways:

• Advanced Persistent Threats (APT’s) are the most likely course of action for an enemy to conduct intelligence gathering in cyberspace.

• Social engineering is the most common attack vector for launching even the most complex APT’s.

• Social media presents a large attack surface that is well suited for social engineering-launched APT’s.

Why do so many APT’s originate from China?

1999: Active offense (Zhu Wenguan and Chen Taiyi): importance of pre-emptive offense

CIA World Fact Book Photo

2002: Gen. Dai Qingmin: Cyber operations precursory (before operations) and whole course (during operations)

1999: Unrestricted Warfare (Qiao Liang and Wang Xiangsui): warfare extends to political, scientific, and economic arenas, and also can occur during “peace time.”

Wang Wei and Yang Zhen (Nanjing Military Academy): in a war against an information-centric community, political system, economic potential, and strategic objectives are high-level targetsLong Fancheng and Li Decai: cyber-operations

against social, economic, and political targets can be done without fear of such activities leading to large-scale military engagements.

CySIS

CySIS

How Do We Determine the Adversary’s Intent?• Current approaches rely on analysis of discovered

malware in the aftermath of an attack

• High reliance on a human analyst supported by tools• Disassembler (IDA-pro) – is an interactive disassembler that

creates maps of program execution• Sandbox – a controlled environment for malware program

execution

• Reports generated by these approaches needs the aid of security analysts to determine intent

CySIS

Toward Automating a Solution• Given malware “attribute atoms” (features)

• We wish to infer “Tasks”

CySIS

System Design

Malware X

Knowledge base(malware samples represented as a set of attributes)

Probability distribution over the set of families that X could belong to

Instance Based Model

Assign family probabilities to the task associated with it and sum up all the tasks

Return set of tasks with a probability of at least 0.5.

Input Ret

urns

Final result

Sandbox(Generates analysis reports)

Parser (represents Malware X as a set of attributes)

Input

CySIS

Results

ACT-R Instance based model outperforms standard machine learning approaches and a state of the art malware capability detection system offered by INVINCEA Inc.

Mandiant GVDG MetaSploit0.6

0.8

1

SVM RF ACTR-IB Incenvia

Aver

age

F1

CySIS

Can we do better?• Malware analysis is primarily reactive – done in the

aftermath of an attack

• Can we be more proactive against emerging threats?

Other hackers use these communication channels to buy/sell exploits and malware

Hackers in groups like Anonymous rely on anonymized social connections to plan and execute hacktivist operations

Can we leverage this communication to gain threat intelligence?

CySIS

Introduction to Cyber-WarfareRated 9 out of 10. Outstanding overview… fascinating read about a most important subject

- Slashdot

Should be on the shelf of every professional concerned with computer security.

- ComputingReviews.com,

A balanced blend of history and technical details- Help Net Security

If you are teaching this subject then use this book.- Krypt3ia

This book feels as if it can stand the test of time. -Professional Security Magazine

This book will be indispensable.- Lieutenant General (ret.) Charles P. Otstott

Currently used as a text at the U.S. Naval Postgraduate School.

CySIS

Thank You!

shak@asu.eduhttp://shakarian.net

top related