application of machine learning and crowdsourcing to detection of cyber threats jaime g. carbonell...

17
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Upload: percival-hensley

Post on 05-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Application of Machine Learning and Crowdsourcingto Detection of Cyber Threats

Jaime G.Carbonell

EugeneFink

MehrbodSharifi

Page 2: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi
Page 3: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Individual user differences• Security needs

- Data confidentiality- Data-loss tolerance- Recovery costs

• Usage patterns• Computer knowledge

Different users need different security tools.

Page 4: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Problems

• “Advanced user” assumption- Complicated customization- Unclear security warnings

• Inflexible engineered solutionswith “too much security”- Too high security at high costs- Insufficient customization

Page 5: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Population statistics

• Almost everyone uses a computer

• Most users are naïve, with limited technical knowledge

• Many security problems aredue to the user naïveté

Page 6: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Long-term goalWe need an intelligent security assistant that... • Learns the user needs • Detects complex threats• Prevents human mistakes• Helps the user to apply available security tools

Page 7: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi
Page 8: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

• Crowdsourcing architecture

• Identification of web scams

• Detection of cross-siterequest forgery

Initial results

Page 9: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Crowdsourcing architectureGathering, sharing, and integration of opinions and warnings about web security threats.

Page 10: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Crowdsourcing architecture

Page 11: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Crowdsourcing architecture

Browser Extension

Web Browser MultipleUsers

Web Service

External DataSources

Page 12: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Identification of web scamsA web scam is fraudulent or intentionally misleading information posted on the web (e.g. work at home and miracle cures).

Page 13: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Identification of web scamsMachine learning approach:

• Collect data about websites, available from various public services

• Collect human opinions

• Apply machine learning (currently, logistic regression) to recognize scams based on the available data

Accuracy: 98%

Page 14: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Detection of cross-site request forgeryA cross-site request forgery is an attack through a browser, in which a malicious website uses a trusted session to send unauthorized requests to a target site.

Email

Malicious

Ads

News

Bank

……

… …

Page 15: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Detection of cross-site request forgery

Machine learning approach:

• Learn patterns of legitimate requests

• Detect deviations from these patterns

• Warn the user about potentially malicious sites and requests

Page 16: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi
Page 17: Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi

Future research

• ... newly evolving threats, not yet addressed by the standard defenses

• ... cyber attacks by their observed “symptoms” in addition to using direct analysis of attacking code

• ... “nontraditional” threats that go beyond malware attacks, such as scams and other social engineering

Application of machine learning and crowdsourcing to detect...