cysis cyber-socio intelligent systems laboratory making smart decisions in cyber and information war...

31
CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ [email protected]

Upload: edmund-haynes

Post on 19-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySISCyber-Socio Intelligent SystemsLaboratory

Making Smart Decisions in Cyber and Information War

Paulo ShakarianArizona State University

Tempe, AZ

[email protected]

Page 2: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Russian Cyber-Warfare

Estonia (2007): Massive hacktivist DDoS

Georgia (2008): Botnet driven DDoS followed by hacktivist DDoS for the purpose of silencing news media and government sites

LiveJournal (2011): Massive DDoS attacks by the Optima botnet to silence anti-Putin journalism

Page 3: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

2014 Russian Cyber-warfare in Ukraine and Crimeia• Small-scale cyber attacks by independent hacking groups

• Some disruption of communication networks between Crimea and Ukraine by conventional forces

• Ukraine parilaiment member phones hacked, and Ukraine gov’t website down for 72 hours

• Sandworm Cyber-Espionage platform (discovered Oct. 2014)

• No large denial of service on the scale of Estonia, Georgia, or LiveJournal

• Where are the big DDoS attacks?

Page 4: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySISMilitary-political, economic, [and] informational competition does not subside but grows in the world.

Vladimir Putin, Dec. 2013

Page 5: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Social Media Tactics• Recruitment of Trolls to increase pro-Kremlin opinion in social

media• Paid to post ~100 comments a day on social media and major news

media articles• Generally write provocative messages to disrupt normal conversation on a

message

• Pro-Russian social media accounts• “Polite People” features Russian Army personnel as respectful to local

population

• Recruitment for fighters in East Ukraine• Narratives stressing religious commonality between Ukraine and

Russia and vilifying the West• Deliberate false information

• Information operation used to disrupt and delay counter-information campaigns

Page 6: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS 6

MH-17 Disinformation

Militia claims “Only dead bodies were aboard the plane”

“Spanish air traffic controller” working in Ukraine blames Ukraine military for the attack

Putin immediately blames Ukrainian military for the incident.

All highly-disseminated

All false

Page 7: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Early Identification• Can we identify viral cascades before they go viral?

• Two queries:• Size-based: If we observe a cascade that has m number of

participants, can we predict if it will grow to size T or greater?

• Time-based: If we observe a cascade that has occurred for t time periods, can we predict if it will grow to size T or greater?

• Ideally, we would prefer to set T to be an order-of-magnitude greater than the current observation.

Page 8: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Large Cascades are Rare

Our study on a Sina Weibo dataset (17.9M users, 22M Tweets) confirmed the previously-observed power-law relationship between cascade size and frequency

Hence, when viewed as a classification problem, the classes are highly imbalanced

Page 9: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Structural Diversity

• An individual adopts behavior based on the fraction of circles he is associated with that previously adopt.

• Inspired by real-world results of Ugander et al. 2012.

• Allows for additional information to be considered (i.e. geography, culture, etc.).

A

B

Intuition: Leverage structural-diversity based measures that are derived from the subgraph of the initial number of adopters.

Page 10: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Viral Classification

• Our method (feature set Am) significantly outperformed previously published best results (Bm) and baseline time-based features (Cm).

Size-Based Time-Based

Page 11: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Viral Classification (Size-Based)

• Our were generally more stable when used to predict cascades of greater sizes

• By varying the training threshold (and maintaining the definition of “viral” for classification) we could trade precision for recall.

Stability Precision vs. Recall

Page 12: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Power Grid Cascading Failure

T

D

G G G G G

T T T

D D D DDD

The power grid is heterogeneous – meaning large scale reconnaissance is difficult. However, to cause a cascade, the adversary may need to recon and attack only a small portion of the power grid.

Page 13: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

The Model

The Attacker conducts cyber-attacks against power grid infrastructure IT systems to disable certain substations that lead to a cascading failure.

The Defender can harden a limited number of systems to prevent the attacker from causing them to fail.

Page 14: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Technical PreliminariesPower grid network:

Source and load nodes:

Edge load:

Failure Operator (applied iteratively):

Payoff function (zero-sum game):

Page 15: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Approach• Deterministic Best-Response: To deal with NP-

hardness (in most cases), we utilized a greedy heuristic

• Minimax (Mixed) Strategy: Leveraged double-oracle algorithm (provides exact solution with oracles to best response) using greedy algorithms for oracles

• Deterministic Load-Based: From the physics literature, based on a definition of load applied to nodes.

Page 16: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Experimental Evaluation

Dataset: An Italian 380kV power transmission grid. • 310 nodes, 113 were source, 96 were load, and the

remainder were transmission nodes• The nodes were connected with 361 edges representing

the power lines

All experiments were run on a server with• An Intel X5677 Xeon Processor, 3.46 , a 12 MB Cache • 288 GB of physical memory • Hat Enterprise Linux version 6.1

Page 17: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Defense Against the Attacker’s Minimax Strategy

1 2 3 4 5 60

10

20

30

40

50

60

70

80

90

Resources (ka=kd)

Ex

pe

cte

d P

ay

off

(D

isc

on

ne

cte

d N

od

es

)

Page 18: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Defense Against the Attacker’s Best Response to DLB

1 2 3 4 5 60

102030405060708090

100

Resources (ka=kd)

Expe

cted

Pay

off

(Dis

conn

ecte

d N

odes

)

Page 19: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Analysis of Attack Positions

0 2 4 6 8 10 1205

101520253035404550

Load

Dis

co

nn

ec

ted

No

de

s

Low-load / high-payoff!!

Page 20: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Cyber Adversarial Intent• Conducting malware forensics is a time-consuming task

for an analyst – even with a malware sandbox:

A [automated] sandbox cannot tell you what malware does. It may report basic functionality, but it cannot tell you that the

malware is a custom Security Accounts Manager (SAM), hash dump utility, or an encrypted keylogging backdoor, for example. Those are conclusions that you must draw on your own.

Practical Malware Analysis

• Can we quickly infer a set of malware tasks from attributes observed in a sandbox run?

Page 21: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

Key takeaways:

• Advanced Persistent Threats (APT’s) are the most likely course of action for an enemy to conduct intelligence gathering in cyberspace.

• Social engineering is the most common attack vector for launching even the most complex APT’s.

• Social media presents a large attack surface that is well suited for social engineering-launched APT’s.

Page 22: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

Why do so many APT’s originate from China?

1999: Active offense (Zhu Wenguan and Chen Taiyi): importance of pre-emptive offense

CIA World Fact Book Photo

2002: Gen. Dai Qingmin: Cyber operations precursory (before operations) and whole course (during operations)

1999: Unrestricted Warfare (Qiao Liang and Wang Xiangsui): warfare extends to political, scientific, and economic arenas, and also can occur during “peace time.”

Wang Wei and Yang Zhen (Nanjing Military Academy): in a war against an information-centric community, political system, economic potential, and strategic objectives are high-level targetsLong Fancheng and Li Decai: cyber-operations

against social, economic, and political targets can be done without fear of such activities leading to large-scale military engagements.

Page 23: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Page 24: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

How Do We Determine the Adversary’s Intent?• Current approaches rely on analysis of discovered

malware in the aftermath of an attack

• High reliance on a human analyst supported by tools• Disassembler (IDA-pro) – is an interactive disassembler that

creates maps of program execution• Sandbox – a controlled environment for malware program

execution

• Reports generated by these approaches needs the aid of security analysts to determine intent

Page 25: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Toward Automating a Solution• Given malware “attribute atoms” (features)

• We wish to infer “Tasks”

Page 26: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

System Design

Malware X

Knowledge base(malware samples represented as a set of attributes)

Probability distribution over the set of families that X could belong to

Instance Based Model

Assign family probabilities to the task associated with it and sum up all the tasks

Return set of tasks with a probability of at least 0.5.

Input Ret

urns

Final result

Sandbox(Generates analysis reports)

Parser (represents Malware X as a set of attributes)

Input

Page 27: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Results

ACT-R Instance based model outperforms standard machine learning approaches and a state of the art malware capability detection system offered by INVINCEA Inc.

Mandiant GVDG MetaSploit0.6

0.8

1

SVM RF ACTR-IB Incenvia

Aver

age

F1

Page 28: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Can we do better?• Malware analysis is primarily reactive – done in the

aftermath of an attack

• Can we be more proactive against emerging threats?

Page 29: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

Other hackers use these communication channels to buy/sell exploits and malware

Hackers in groups like Anonymous rely on anonymized social connections to plan and execute hacktivist operations

Can we leverage this communication to gain threat intelligence?

Page 30: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Introduction to Cyber-WarfareRated 9 out of 10. Outstanding overview… fascinating read about a most important subject

- Slashdot

Should be on the shelf of every professional concerned with computer security.

- ComputingReviews.com,

A balanced blend of history and technical details- Help Net Security

If you are teaching this subject then use this book.- Krypt3ia

This book feels as if it can stand the test of time. -Professional Security Magazine

This book will be indispensable.- Lieutenant General (ret.) Charles P. Otstott

Currently used as a text at the U.S. Naval Postgraduate School.

Page 31: CySIS Cyber-Socio Intelligent Systems Laboratory Making Smart Decisions in Cyber and Information War Paulo Shakarian Arizona State University Tempe, AZ

CySIS

Thank You!

[email protected]://shakarian.net