the artificial reality of cyber defense - cisco€¦ · march 2016 –microsoft unveiled tay an...

22
The Artificial Reality of Cyber Defense Igor Kontsevoy (& Pascal Geenens) SE Radware

Upload: others

Post on 27-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

The Artificial Reality of Cyber DefenseIgor Kontsevoy (& Pascal Geenens)

SE

Radware

Page 2: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Cyber Kill Chain® by Lockheed Martin

© 2019 Cisco and/or its affiliates. All rights reserved.

• Targeted attacks

• Plenty of opportunities to detect and block attacks before they cause actual damage

• So why organizations still getting breached and only find out (long) after the fact ; by accident or through ransom ?

• Two reasons mainly:

• Not enough events / visibility

• Too many events / false positives

Image Source: Dark Reading - Deconstructing The Cyber Kill Chain - Giora Engel

Page 3: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Minimizing False Positives & False Negatives

© 2019 Cisco and/or its affiliates. All rights reserved.

Image Source: Effect Size FAQs by Paul Ellis

Why minimize

- False Negatives?

Are you Seriously !?!?

- False Positives?

How much incidents can your SOC investigate? Do you give the right incidents the attention they deserve?

Page 4: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Detection Sensitivity

© 2019 Cisco and/or its affiliates. All rights reserved.

Pro

bab

ility

Sensitivity

False Negative False Positive

Negative Security Model

xx’

Page 5: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Anomaly Detection – Game On!

© 2019 Cisco and/or its affiliates. All rights reserved.

• Security threats growing faster than security teams and budgets, huge talent shortage

• Paradox: Proliferation of data from dozens of security products makes it harder to detect and investigate threats

• Rule based event correlation provides reduction from millions to thousands

• A good SOC can investigate maybe a couple of 100 incidents a day

• How to leverage previous work from the SOC to improve the future detection

• Need for automation

Page 6: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Cyber Security

Machine Learning

Page 7: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took
Page 8: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Deep Learning

© 2019 Cisco and/or its affiliates. All rights reserved.

Trained coefficients

Page 9: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Traditional Machine Learning Behavioral-Based Detection Principles

© 2019 Cisco and/or its affiliates. All rights reserved.

x2

x1

x3

score (DoA)

N1

N2

S1

N3

N

S2

S3A3

A1

A2

S

A

Analytic Classifier Code

Rate Rate Invariantx1

x2

Score

(DoA )

x1 x2

x3

Observation Vector

• Complexity of behavioral model is low/med (eg RFC State Machine)

• Code (analytic classifier) can be use to describe the expected behavior

• Data is used for baselining (@ peace-time)

• Limited data sufficient for low false positive rate

Page 10: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Deep Learning Behavioral Detection Principles

© 2019 Cisco and/or its affiliates. All rights reserved.

Trained coefficients Different Problems Samples

x1 x2

x3

Observation Vector

x4

x5

• Complexity of behavioral model is high/very-high

• Can’t use code to describe expected behavior

• Data used to describe the expected behavior (“training”)

• Lots of ‘good’ data required

Page 11: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Detection Algorithms & Machine Learning

© 2019 Cisco and/or its affiliates. All rights reserved.

COMPLEXITY

DeterministicTransparentData provides baselines

Too complex to codeGeneralization

Opaque

ABILITY TO MITIGATE AUTOMATICALLY / TIME TO MITIGATE

K-means ClusteringLogistic Regression

Bayesian Linear RegressionSupport Vector Machine

Principal Component Analysis

Page 12: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Deep Learning

Challenges

Page 13: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Challenges

© 2019 Cisco and/or its affiliates. All rights reserved.

Reproducibility Transparency Learning in Adversarial

Contexts

Learning in Changing

Environments

TrainingData

Page 14: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Poisoning Attacks

© 2019 Cisco and/or its affiliates. All rights reserved.

March 2016 – Microsoft unveiled TayAn innocent chatbot (twitterbot)An experiment in conversational understanding

It took less than 24 hours before the community corrupted an innocent AI chatbot

https://i.kym-cdn.com/photos/images/original/001/096/674/ef9.jpg

Page 15: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Adversarial Attacks

© 2019 Cisco and/or its affiliates. All rights reserved.

Source: http://blog.ycombinator.com/how-adversarial-attacks-work/

Page 16: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Adversarial Attacks

© 2019 Cisco and/or its affiliates. All rights reserved.

Camouflage graffiti and art stickers cause a neural network to misclassify stop signs as speed limit 45 signs or yield signs

Source: https://thenewstack.io/camouflaged-graffiti-road-signs-can-fool-machine-learning-models/

Page 17: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

ML & DL for Cyber Criminals (Breaking CAPTCHA)

© 2019 Cisco and/or its affiliates. All rights reserved.

• 2012: Support Vector Machines (SVM) to break reCAPTCHA

• 82% accuracy

• 2016: Breaking simple-captcha using Deep Learning• 92% accuracy

• 2016: I’m not Human - breaking the Google reCAPTCHA

• 98% accuracy

Page 18: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

SNAP_R – Automated Spear-Phishing Experiment

© 2019 Cisco and/or its affiliates. All rights reserved.

• Man vs Machine – 2 hour bake off

• SNAP_R

• 819 tweets

• 6.85 simulated spear-phishing tweets/minute

• 275 victims

• Forbes staff writer Thomas Fox-Brewster

• 200 tweets

• 1.67 copy/pasted tweets/minute

• 49 victims

https://www.blackhat.com/docs/us-16/materials/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter.pdf

Page 19: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Summary &Looking Ahead

Page 20: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Итог

© 2019 Cisco and/or its affiliates. All rights reserved.

Нам брошен вызов – сможем ли мы на него ответить?

Нужен ли нам, еще один прорыв в области машинного обучения и нейронных сетей?

Page 21: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took
Page 22: The Artificial Reality of Cyber Defense - Cisco€¦ · March 2016 –Microsoft unveiled Tay An innocent chatbot (twitterbot) An experiment in conversational understanding It took

Спасибо за внимание!

www.facebook.com/CiscoRu

© 2019 Cisco and/or its affiliates. All rights reserved.

www.instagram.com/ciscoru

www.youtube.com/user/CiscoRussiaMedia

www.vk.com/cisco

Оцените данную сессию в мобильном приложении конференции

Контакты:

Тел.: +7 495 9611410www.cisco.com