SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Overview    Detection Approaches     Entropic Defense     Unholy Present/Future   Epilogue   Sources




           Defending against Adversarial Cyberspace
           Participants by Morphing The Gameboard

                                           Daniel Bilar

                                     University of New Orleans
                                   Department of Computer Science


                                   Sandia National Labs
                                   Cyber Security Forum
                                    Albuquerque, NM

                                        October 7, 2010
Overview       Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Speaker

       A bit about me
       Domicile Born in the US, grew up in Germany, France, mostly Switzerland.
       Came to the US for post-secondary studies. Been here almost twenty years
       Education Business, law, economics; philosophy, history, political science,
       computer science; operations research, industrial engineering, engineering
       sciences, theology
       Work Salesman, software engineer, financial analyst, consultant,
       college/university professor.

       Research Field: Security Studies
       Background As PhD student, founding member of the Institute for Security
       and Technology Studies at Dartmouth (counter-terror, defense research for
       US DoJ and US DHS)
       Security Studies Solutions cannot be mere math/technical - spans different
       dimensions such as psychology, technology, computer science, operations
       research, history, law, sociology and economics
       Funding DoD/NSA, NASA, Navy SPAWAR, Louisiana BoR
Overview        Detection Approaches   Entropic Defense    Unholy Present/Future   Epilogue       Sources



Talk Roadmap
       Status Quo
       Classic AV byte-pattern matching has reached its practical and theoretical limits with
       modern malware

       Why? Problem Setup favors Adversary
       They pose hard problems Through design dissimulation techniques, their
       functionality and intent difficult to ascertain
       We are easy Targets situated on a predominantly WYSIWYG “gameboard”
       → Defenses forced to solve time-intensive (minutes, hours, days) halting
       problems while adversarial cyberspace participants do not
       Hence, have to turn tables to achieve required subsecond defense responses

       Autonomous Baiting, Control and Deception (ABCD)
       Inversion of Problem Setup By means of morphing adversary’s view of gameboard,
       increase adversarial participant’s footprint, noise levels, decision complexity
       Bait, Control and Deceive By means of a repeated dynamic stimuli-response game,
       framework decides probabilistically nature of participant and engages appropriate
       defensive measures
       End vision AI-assisted, sub-second decision cycle, autonomic stimuli response
       framework that probabilistically determines, impedes, quarantines, subverts, possibly
       attributes and possibly inoculates against suspected adversarial cyberspace participants
Overview        Detection Approaches   Entropic Defense    Unholy Present/Future   Epilogue       Sources



Signals from Above
       AF Chief Scientist Werner Dahms on USAF Science & Technology 2010-2030 [Dah10]
       Augmentation of Human Performance Use of highly adaptable autonomous
       systems to provide significant time-domain operational advantages over adversaries
       limited to human planning and decision speeds
       Massive virtualization Agile hypervisors, inherent polymorphism complicate
       adversary’s ability to plan and coordinate attacks by reducing time over which
       networks remain static, and intruder to leave behind greater forensic evidence for
       attribution.
       Resilience Make systems more difficult to exploit once entry is gained; cyber
       resilience to maintain mission assurance across entire spectrum of cyber threat levels,
       including large-scale overt attacks
       Symbiotic Cyber-Physical-Human Augmentation through increased use of
       autonomous systems and close coupling of humans and automated systems
       Direct augmentation of humans via drugs or implants to improve memory, alertness,
       cognition, or visual/aural acuity, screening (brainwave patterns or genetic correlators)

       2011 IEEE Symposium on Computational Intelligence in Cyber Security (April 2011)
       Mission Assurance Track Explore theoretical and applied research work in the
       academic, industrial, and military research communities related to mission assurance.
       Selected Topics Mission representation, modeling, simulation, visualization, impact
       estimation and situational awareness; Decision making and decision support;
       Engineering for mission assurance and resilience strategies.
Overview            Detection Approaches        Entropic Defense            Unholy Present/Future        Epilogue   Sources



Detection Rates: Malware Increasingly Resistant
       Bad: Empirical AV Results
                   Report Date         AV Signature Update         MW     Corpus Date        False Negative (%)
                   2010/05             Feb. 10th                   Feb.   11th -18th         [37-89]
                   2010/02             Feb. 10th                   Feb.   3rd                [0.4-19.2]
                   2009/011            Aug. 10th                   Aug.   11th -17th         [26-68]
                   2009/08             Aug. 10th                   Aug.   10th               [0.2-15.2]
                   2009/05             Feb. 9th                    Feb.   9th -16th          [31-86]
                   2009/02             Feb. 9th                    Feb.   1st                [0.2-15.1]
                   2008/11             Aug. 4th                    Aug.   4th -11th          [29-81]
                   2008/08             Aug. 4th                    Aug.   1st                [0.4-13.5]
                   2008/05             Feb. 4th                    Feb.   5th -12th          [26-94]
                   2008/02             Feb. 4th                    Feb.   2nd                [0.2-12.3]
       Table: Empirical miss rates for sixteen well-known, reputable AV products (AV-Comparatives.org).
       After failing to update signatures for one week, the best AV missed between 26-31 % of the new
       malicious software, the worst missed upwards of 80 %




       Worse: Theoretical Findings
       Hitherto tractable linear time struggling against NP-completeness and
       undecidability. Detection of interactive malware is at least in complexity class
              NPoracle
           NPoracle
       NP         [EF05, JF08]
       Blacklisting Deadend Infeasibility of modeling polymorphic shellcode [YSS07]
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



1st Fingerprint: Win32 API Calls


       Synopsis
       Observe and record Win32 API calls made by malicious code during
       execution, then compare them to calls made by other malicious code
       to find similarities

       Goal
       Classify malware quickly into a family
       Set of variants make up a family

       Main Result (2005) [Rie05]
       Simple (tuned) Vector Space Model yields over 80% correct
       classification
       Behaviorial angle seems promising
Overview        Detection Approaches   Entropic Defense       Unholy Present/Future     Epilogue   Sources



Win32 API Calls: Results




                                                          Figure: Threshold parameter




                                       Classification and AV Corroboration
                                       Classification by 17 AV scanners yields 21
                                       families. > 80 % correspondence (csm
     Figure: 77 malware samples        threshold = 0.8).
     classified
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



2nd Fingerprint: Opcode Frequency

       Synopsis
       Statically disassemble the binary, tabulate the opcode frequencies and
       construct a statistical fingerprint with a subset of said opcodes

       Goal
       Compare opcode fingerprint across non-malicious software and
       malware classes for quick identification purposes

       Main Result (2006) [Bil07b]
       For differentiation purposes, infrequent opcodes explain more data
       variation than common ones
       Static makeup Not good enough as discriminator.
       Exacerbating: ROP [RBSS09][CSR10], ‘malicious computation’ (Sept.
       2010: Adobe 0-day CVE-2010-2883 used ROP attack to bypass DEP)
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



3rd Fingerprint: Callgraph Properties


       Synopsis
       Represent executables as callgraph, and construct graph-structural
       fingerprint for software classes

       Goal
       Compare ‘graph structure’ fingerprint of unknown binaries across
       non-malicious software and malware classes

       Main Result (2007) [Bil07a]
       Malware tends to have a lower basic block count, implying a simpler
       functionality: Less interaction, fewer branches, limited goals
       Behavioral Angle Can we use simpler decision structure to ‘outplay’
       malware?
Overview   Detection Approaches   Entropic Defense         Unholy Present/Future   Epilogue   Sources



Callgraph: Overview


                                                     Procedure
                                                       1   Booted VMPlayer with XP
                                                           image
                                                           a Goodware: Sampled 280 files
                                                             from XP box
                                                           b Malware: Fixed 7 classes and
                                                             sampled 120 specimens
                                                       2   Structural parsing with IDA
                                                           (with FLIRT) and IDAPython
                                                       3   Structural data into MySQL
                                                       4   Analyzed callgraph data with
                                                           BinNavi, Python and Matlab
Overview        Detection Approaches    Entropic Defense   Unholy Present/Future    Epilogue      Sources



Callgraph: Degree Distribution


                                                             Power (Pareto) Law
                                                             Investigate whether indegree
                                                             dindeg (f), outdegree doutdeg (f)
                                                             and basic block count dbb (f)
                                                             distributions of executable’s
                                                             functions follows a truncated
                                                             power law of form
                                                                                             m
                                                                                   αd∗ (f) − kc
                                                                 Pd∗ (f) (m) ∼ m         e

                                                             with α a power law exponent,
                                                             kc distribution cutoff point,
                                                             α(n) Hill estimator (inset) used
                                                             ˆ
                                                             for consistency check [CSN09]
     Figure: Pareto fitted ECCDF with Hill estimator α(n)
                                                    ˆ
Overview        Detection Approaches      Entropic Defense       Unholy Present/Future   Epilogue   Sources



Callgraph: Flowgraph Example


                                                                      Metrics Collected
                                                                      Basic block count of
                                                                      function
                                                                      Instruction count of a
                                                                      given basic block
                                                                      Function ‘type’ as normal,
                                                                      import, library, thunk
                                                                      In- and out-degree of a
                                                                      given function
                                                                      Function count of
                                                                      executable

 Figure: Backdoor.Win32.Livup.c: Flowgraph of sub_402400,
 consisting of six basic blocks. The loc_402486 basic block is
 located in the middle of the flowgraph given above
Overview        Detection Approaches     Entropic Defense      Unholy Present/Future   Epilogue   Sources



Backdoor.Win32.Livup sub_402400 callgraph


                                                                    Metrics Collected
                                                                    Basic block count of
                                                                    function
                                                                    Instruction count of a
                                                                    given basic block
                                                                    Function ‘type’ as normal,
                                                                    import, library, thunk
                                                                    In- and out-degree of a
                                                                    given function
                                                                    Function count of
                                                                    executable

    Figure: Callgraph of sub_402400: Indegree 2, outdegree 6
Overview         Detection Approaches      Entropic Defense       Unholy Present/Future     Epilogue      Sources



Callgraph: α Ranges




       Figure: αindeg = [1.5 − 3], αoutdeg = [1.1 − 2.5]andαbb = [1.1 − 2.1], with a greater spread for
       malware
Overview         Detection Approaches       Entropic Defense        Unholy Present/Future     Epilogue   Sources



Callgraph: Differentiation Results

                  class                 Basic Block            Indegree             Outdegree
                  t                     2.57                   1.04                 -0.47
                  Goodware              N(1.634,0.3)           N(2.02, 0.3)         N(1.69,0.307)
                  Malware               N(1.7,0.3)             N(2.08,0.45)         N (1.68,0.35)
       Table: Only one statistically relevant difference found: Basic block distribution metric
       µmalware (kbb ) = µgoodware (kbb ) via Wilcoxon Rank Sum




       Interpretation
       Malware tends to have a lower basic block count, implying a
       simpler functionality: Less interaction, fewer branches, limited
       functionality

       Idea
       Kasparov wins games because he can think 5-7 moves ahead. Can we
       use simpler decision structure to outplay simpler malware?
Overview   Detection Approaches   Entropic Defense         Unholy Present/Future    Epilogue        Sources



Conceptual: Actively Morphing, Game-Playing Defense
Framework

Idea: Subversion of Decision Loop
Interactive, morphing framework
to manipulate, mislead and contain
MW.
Infer MW internal decision points,
then change the environment (i.e.
passive environmental morphing and
active environmental stimuli), thus
manipulating the observables
malware might use for its decisions.
Environment plays an iterative,
seemingly cooperative, mixed
                                                     Figure: The environment and the malware can be
strategy, multi-player game.                         seen as engaged in an iterative, seemingly
Goal Subvert MW’s internal control                   cooperative, possibly mixed strategy, possibly
                                                     multi-player game. Can I identify, quantify and
structure and goad it into a position                deploy strategies (i.e. passive environmental
favorable to the defense.                            morphing and active environmental stimuli) to goad
                                                     malware into a payoff corner?
Overview           Detection Approaches    Entropic Defense     Unholy Present/Future    Epilogue        Sources



ABCD-ACP: Defending Against Adversarial Cyberspace
Participants




           Figure: Morphing the Gameboard and Engaging Potentially Adversarial Cyberspace Participants
Overview   Detection Approaches   Entropic Defense       Unholy Present/Future     Epilogue        Sources



ABCD-ACP: Characteristics

Goals
Continuous Evolution and
Adaptation of interaction strategies
through algorithms (machines) and
intuition (human crowdsourcing)
Resilience against subversive
participants seeking to undermine
strategies
Continuous increase in decision
                                                     Figure: Engagement Gameboard: Participants
cycle speed from seconds to                          operate on a gameboard injected with stimuli.
microseconds Aggressive                              Through dynamic re-configuration of the
                                                     virtualized environment through baits/stimuli and
optimization over all framework                      responses, influence potential adversarial
components, workflow and bottlenecks                  participants (both humans and programs)
                                                     perception of environment, control behavior and
Stability Guarantees DoD network                     goad it into a position favorable to the defense.
sizes through rigorous mathematical
analysis and simulation
Overview         Detection Approaches   Entropic Defense    Unholy Present/Future   Epilogue        Sources



Morphing the Gameboard: Concepts
       Overview
       Gameboard consists of virtualized operating environment (we use VMWare) into
       which bait/stimuli are injected to induce potential ACP’s (both humans and programs) to
       ‘show their colors’
       Probabilistic identification via stimuli/responses ‘game’. Serves to weigh different
       hypotheses (ex: loglikelihood Bayesian odds) consistent with aggregate evidence
       whether a participant’s observed behavior can be classified as adversarial
       Baits/Stimuli Gameboard-morphing actions taken by Defender to induce behavioral
       responses from participants. Specificity (low false positives are desired: Does it flag
       benevolent participants as adversarial?) and sensitivity (low false negatives are desired:
       Does it miss adversarial participants?)
       Morphing the Gameboard Influence ACP’s perception of the environment, and goad
       it into a position favorable to the defense


       Hypotheses

           1 From observations of stimuli/responses, uncertainty viz unknown intent can be
             reduced. In particular, potential adversarial participants can be probabilistically
             identified.
           2 Defender can control the behavior of ACPs by influencing their perception of the
             Gameboard to the defense’s benefit
Overview         Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue    Sources



Morphing the Gameboard: Concepts
       Players
       System Set of benign processes on the Gameboard. Defender does not know this
       benevolence a priori
       Participants Potentially adversarial programs or humans on the Gameboard.
       Defender does not know this a priori
       Defender Morphs the Gameboard with stimuli, assesses responses, and engages
       defense actions. Defender is part of the System, and is able to distinguish its own
       responses from the rest of the System


       Defensive Actions
       Defender conversation consists of a high level scenario which is either preemptively
       engaged, chosen by the user, or activated by other defensive systems. Conversation
       examples include “Worm”, “Rootkit”, “Bot”, “Trojan” and more.
       Defender scenario informs one or more engagement types. Engagement type
       examples include “present spread vectors”, “present confidentiality vectors”, “present
       reconnaissance vectors”, “present weakened defenses”, “change system parameters”
       and more. For each engagement type, Defender autonomously chooses a dynamic
       engagement strategy
       Engagement Strategy Game tree aggregate of baits (stimuli) and participants.
       Dynamic game tree because depending on the reaction of the potential malicious
       activity, next bait/stimuli dynamically chosen.
Overview           Detection Approaches        Entropic Defense           Unholy Present/Future     Epilogue       Sources



Morphing the Gameboard: Baits
       Baits Portfolio
           Bait              Bait actions                         Malware Ex.                     False Positive
           Dummy             Inject false antivirus pro-          Conficker (kills AV pro-         low
           processes         grams into the OS process            cesses),    Bugbear (shuts
                             list and monitor for halt in         down various AV pro-
                             execution                            cesses), Vundo (disables
                                                                  Norton AV)
           Network           Mounts and removes net-              MyWife.d (attempt to delete     medium
           Shares            work shares on the client            System files on shared
                             then monitors for activity           network drives), Lovgate
                                                                  (copies itself to all network
                                                                  drives on an infected com-
                                                                  puter), Conficker (infects all
                                                                  registered drives)
           Files             Monitors critical or bait            Mydoom.b (alters host file to    low
                             (.doc, .xls, .cad) files              block web traffic), MyWife.d
                                                                  (deletes AV system pro-
                                                                  grams), Waledac.a (scans lo-
                                                                  cal drives for email adds )
           User action       Executes normal user be-             Mydoom.b (diverts network       high
                             havior on the client system          traffic thus altering what is
                             and monitors for unusual             expected to appear), Vundo
                             execution                            (eat up system resources -
                                                                  slows program execution)
                                      Table: Baits implemented so far for Gameboard
Overview         Detection Approaches      Entropic Defense    Unholy Present/Future      Epilogue         Sources



Morphing the Gameboard: Defender

  Defender Goals                                              Defender Action
  Mission assurance/continuity Defender should not            Abstract Categories Collberg’s [primitives]
  self-sabotage or sabotage System’s mission. Mission         (cover, duplicate, split/merge, reorder, map,
  continuity constraints include but are not limited to:      indirect, mimic, advertise, detect/ response,
  sustain mission availability, confidentiality, integrity,    dynamic) [CN09]
  authenticity and more.                                      Quarantine [Indirect] Defender moves
  Actionable Information Gain: Defender’s responses           Participant to an instrumented but isolated
  geared towards learning more about the potential            platform in order to learn more about its
  adversarial participant (e.g. by migrating ACP into a       behavior.
  highly instrumented environment).                           (Self-)terminate [Tamperproof ] Defender
  Defender Stealth Potentially adversarial participant        terminates Participant or induces its
  should remain unaware of Defender’s observation and         self-termination. In addition, Defender may
  manipulation of ACP’s view of Gameboard                     simulate termination of benign System
  Subversion Defender responds in such a way as to            components as a strategic mimetic move (such
  repurpose the ACP                                           as unlinking it from the process table).
  Participant Attribution Defender responds in such a         Holodeck [Mimicry, Tamperproof ]
  way that attribution of adversarial behavior source is      Defender presents ”critical” or ”strained”
  made more likely (e.g. smart watermarking/ poisoning        Gameboard state in an effort to violate ACP’s
  of data).                                                   expectation (e.g. 99% memory utilization,
  Inoculation Defender can synthesize a general modus         heavy network congestion, no heap space left).
  operandus over observed behavior to build a vaccine,        Subversion [Tamperproof ]:
  supplementing efforts in the realm of byte code              Data-taint/poison potential ACP in order to
  signatures.                                                 create an attribution trail. Especially important
                                                              for military defense systems, where attackers
                                                              try to plausibly deny responsibility through
                                                              one of more levels of indirection.
Overview        Detection Approaches            Entropic Defense     Unholy Present/Future   Epilogue   Sources



ABCD Validation Overview

       Five Measurable Milestones
       Decision cycle speed Median from time of the first response of the potentially
       adversarial participants to the first defensive action implemented
       False positives are benign participants whom the framework classifies as adversarial
       False known negatives are known adversarial programs that the framework fails to
       classify as such
       False 0-day negatives are gold standard: Never-seen-before attacks by humans and
       programs




                                       Figure: ABCD Metrics and Milestones: 4 years
Overview        Detection Approaches            Entropic Defense     Unholy Present/Future   Epilogue   Sources



ABCD Year 1

       Year 1: Framework Proof of Concept
       Develop optimization-instrumented framework elements (baits/ responses/
       defense strategies/ action)
       Validate and measure Bait (False positives, false negatives), defense strategies/actions
       and decision cycle time
       Implementation Choke points Dead ends and R& D towards year 2
       System stability analysis Non-linearities, self-DoS




                                       Figure: ABCD Metrics and Milestones: 4 years
Overview       Detection Approaches            Entropic Defense     Unholy Present/Future   Epilogue   Sources



ABCD Year 2

       Year 2: Two-Pronged Game Strategy Evolution Push
       Improve Incorporate stimuli/ response/ defense validation results
       Algorithmic R & D recombinant machine strategy evolution framework
       Human, R & D human crowdsourcing game to harvest intuitions/moves strategies
       Wargames (1983) Evolve strategies by deploying PoC evolution framework on
       supercomputer
       Mathematical System Analysis Stability, Scalability
       Transition Begin developing transition roadmap to real life systems




                                      Figure: ABCD Metrics and Milestones: 4 years
Overview       Detection Approaches            Entropic Defense     Unholy Present/Future   Epilogue   Sources



ABCD Year 3

       Year 3: ABCD-ACP Framework 2.0
       Upgrade With stability, scalability, validation, strategy results, redesign V2 of
       ABCD-ACP framework
       Integration Human/machine strategies evolution mechanism and defense into
       ABCD-ACP 2.0
       Subversion R & D into resilience of ABCD-ACP against subversive players (evolution
       of malicious adversarial participants)
       Transition Continue developing transition roadmap to real life systems
       Production Push R & D into metrics and milestone for year 4




                                      Figure: ABCD Metrics and Milestones: 4 years
Overview        Detection Approaches            Entropic Defense     Unholy Present/Future   Epilogue   Sources



ABCD Year 4

       Year 4: ABCD-ACP Framework 3.0
       Validation Resiliency of ABCD-ACP 3.0 against subversive players
       Update and Check Survey threat horizon, incorporate and validate
       bait/response/defenses
       Upgrade With stability, scalability, validation, strategy results, redesign 3.0 of
       ABCD-ACP framework
       Mathematical System Analysis Stability, Scalability
       Tech transfer Transfer ABCD-ACP project: Decision control system (stimuli-response
       framework), knowledge base (bait and defense strategies) and evolution mechanism to
       DoD real life system




                                       Figure: ABCD Metrics and Milestones: 4 years
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Theoretical and Implementation Challenges Ahead
       “A problem worthy of attack proves its worth by fighting back”
       Bait specificity and sensitivity Need empirical quantification with
       robust bait portfolio
       Multiple ACPs Implicitly assume just one ACP operating at a time -
       multiple ACPs gives Discrete Source Separation Problem. Promising
       approach is Process Query Systems [CB06]
       Computational Learning Need to analyze and control the rate of
       convergence. Informal goal is ACP identification with 2-4
       bait/stimuli/response moves. Learning through interaction as a
       validation mechanism has been studied using, for instance, PAC or
       Vapnik-Chervonenkis theory
       Stochastic Imperfect Information Game Payoff tied to
       knowledge, varies over time, retroactively. Is this analytically
       solvable or maybe a good heuristic?
       Morphing Fundamentals System state, entropy measures, and
       multi-objective optimization problem (stability, management)
       Performance Open question whether aggressive metrics can be met
       (will seek inspiration from financial trading)
Overview         Detection Approaches       Entropic Defense             Unholy Present/Future                 Epilogue                 Sources



Morphing Ground Truth: System’s Degrees of Freedom

System State and Entropy Measures
Defense goal is not to maximally confuse ACP, but to
manipulate malware’s decision tree by controlling its
cross-entropy calculus Dx of perceived
target/environment. Requires appropriate state
representation of Gameboard and entities, since
this directly determines cross-entropy measure Dx

Ex: If system’s governing distribution (probability of
given realization) P = P(ni |qi , N, s, I) s.t. prior
probabilities qi , number of entities N, number of states
        Xs
s with      ni = N and background information I is
           i=1
                               Y q ni
                               s
multinomial with P = N!           i
                                     , then
                           i=1
                                ni !                           Figure:     Model of Maxwell-Boltzmann (a-b), (c) Bose-Einstein and (d)
                                                               Fermi-Dirac systems
cross-entropy to manipulate is Kullback-Leibler
       X“s                                        ”            a) N distinguishable balls to s disting. boxes, with ni of each state → PMB
  x              −1                       −1
DKL =        pi N ln N! + pi ln qi − N ln((pi N)!)             is multinomial
                                                               b) Urn has M disting. balls, with mi of each state, sample N balls with
           i=1
                                                               replacement with ni in each state → PMB is multinomial
However, if system is not governed by multinomial P
(e.g. Bose-Einstein system’s PBE is multivariate                                             gi +ni −1
                                                                                            “          ”
                                                               c) Balls indistinguishable,               permutations of ni indisting. balls in
                                                                                                 ni
negative hypergeometric), Dx is not KL
                             BE                                gi disting. boxes → PBE is multivariate negative hypergeometric
                                                                                                                   gi
                                                                                                                 “ ”
                                                               d) Balls indistinguishable, max. 1 in each level,        permutations of ni
                                                                                                                   ni
Cross-entropy Dx and Shannon entropy not
                 KL                                            indisting. balls in gi disting. boxes with ni ∈ {0, 1} → PFD is
universal, do not apply to every system [Niv07]                multivariate hypergeometric
Overview        Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue        Sources



Future Future
       End Vision of ABCD-ACP
       ‘Skynet’ AI-assisted, microsecond decision cycle, autonomic stimuli response
       framework that probabilistically determines, impedes, quarantines, subverts, possibly
       attributes and possibly inoculates against suspected adversarial cyberspace participants
       Human Symbiosis Co-evolution into an autonomous defense ‘alter ego’ for human
       decision makers. Coupled with stress (emotion) sensors poised to take over when
       judgment is deemed to be too affected by emotions andor information overload
       → Spirit of USAF Science & Technology 2010-2030 [Dah10])

       Complements Efforts In Other Military Domains
       DARPA’s Integrated Battle Command (BAA 05-14) Give decision aids for battle
       operations
       DARPA’s Real-Time Adversarial Intelligence & Decision Making (BAA 04-16)
       Help battlefield commander with threat predictions in tactical operation
       Israel’s Virtual Battle Management AI Robotic AI defense system take over from
       flesh-and-blood operators. In event of doomsday strike, system handles attacks that
       exceed physiological limits of human command

       Why Emphasis on Autonomous Decision?
       Human Operator is Subsystem Possible to degrade and subvert end system through
       subsystem attacks
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Subsystem Subversion: nth Order Attacks
       Objective
       Induce Instabilities in mission-sustaining ancillary systems that
       ultimately degrade, disable or subvert end system
       n: Degree of relation 0th order targets the end system, 1st order
       targets an ancillary system of the end system, 2nd order an ancillary
       system of the ancillary system etc.

       Systems
       Definition A whole that functions by virtue of interaction between
       constitutive components. Defined by relationships. Components may
       be other systems. Key points: Open, isomorphic laws
       Nature Technical, algorithmic, societal, psychological, ideological,
       economic, biological and ecological possible
       Examples Resource allocation / throughput control, manufacturing,
       visualization environments, social welfare systems, voting systems,
       data / goods / energy generation/ transmission/ distribution,
       reputation management, entropy externalization, business models and
       economic systems
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Systems, Attacks and Assumption Violation

       Assumptions
       Fundamentally, attacks work because they violate assumptions
       Finite (i.e real life engineered or evolved) systems incorporate
       implicit/explicit assumptions into structure, functionality, language
       System geared towards ‘expected’, ‘typical’ cases
       Assumptions reflect those ‘designed-for’ cases

       Intuitive Examples of Attacks and Assumption Violations
       Man-in-Middle Attacks Identity assumption violated
       Race Condition Attacks Ordering assumption violated
       BGP Routing Attacks Trust assumption violated

       Generative Mechanism and Assumptions
       Optimization process incorporating tradeoffs between objective
       functions and resource constraints under uncertainty
       Some assumptions generated by optimization process
Overview    Detection Approaches   Entropic Defense   Unholy Present/Future             Epilogue    Sources



Optimization Process: Highly Optimized Tolerance

HOT Background                                        Probability, Loss, Resource
Generative first-principles approach                   Optimization Problem [MCD05]
proposed to account for power laws
              m
P(m) ∼ mα e− kc in natural/engineered                                          min J                   (1)
systems [CSN07, CD00]
                                                      subject to
Optimization model incorporates
tradeoffs between objective functions and
                                                                           X
                                                                                 ri    ≤        R      (2)
resource constraints in probabilistic
environments                                          where

Used Forest, internet traffic, power and                                    J     =
                                                                                       X
                                                                                            pi li      (3)
immune systems                                                            li    =      f(ri )          (4)
                                                                          1     ≤      i≤M             (5)
Pertinent Trait
                                                      M events (Eq. 5) occurring iid with probability
Robust towards common perturbations,                  pi incurring loss li (Eq. 3)
                                                      Sum-product is objective function to be
but fragile towards rare events                       minimized (Eq. 1)
Inducing ‘rare events’ in ancillary                   Resources ri are hedged against losses li , with
                                                      normalizing f(ri ) = − log ri (Eq. 4), subject to
systems is goal of nth order attack                   resource bounds R (Eq. 2).
Overview       Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Subsystem Attacks: Examples

       Target Ancillary System to Subvert End Systems [Bil10]
       P2P Networks RoQ attacks can be mounted against distributed hash tables
       used for efficient routing in structured P2P networks through join/leave
       collusions and bogus peer newcomer notifications
       Power Grid Load balancing in electricity grids relies on accurate state
       estimation. Data integrity attacks on a chosen subset of sensors make these
       estimates unreliable, which could push such feedback systems into unstable
       state
       Democracy Voting systems assume honest participants vote their actual
       preference. In elections with more than two candidates, system can be
       undermined by strategic voting, targeting the ranking process subsystem
       Trusted Code Second-order control-flow subversion attack termed
       return-oriented programming (ROP) induce innocuous code to perform
       malicious computations
       Financial Exchange Advent of high-frequency trading infrastructures
       (physically collocated, hence low latency) gave rise to trading approaches
       (first- and second-order degradation and subversion attacks) targeting the
       Efficient Market Hypothesis and its subsystems
Overview   Detection Approaches   Entropic Defense   Unholy Present/Future     Epilogue         Sources



Adaptation System Attack: Network Protocols

 Reduction-of-Quality Attack [GB07]
 1st or 2nd order degradation attack;
 targets adaptation mechanisms of
 network protocols
 M.O. Non-DoS, low-bandwidth traffic
 maliciously optimized against admission
 controllers and load balancers
 Forces adaptive mechanism to
 oscillate between over- and under-load
 condition → degrades end system                     Figure: Oscillation between high system
                                                     steady state rate x∗ and lower system steady
 performance                                         state y∗ . Assume system services requests at a
 Assumption violation ‘Normal traffic’                 high steady state rate x∗ , thanks to its
                                                     adaptation subsystem that seeks to optimize
 requests                                            service rates. RoQ attack (burst time t shaded)
 Rare event RoQ attack’s δ requests per              push system from x∗ , which then slowly
                                                     convergences at rate ν to lower steady state
 second for burst time t (shaded) repeated           y∗ . Since attacks ceased, after some time,
 over period T constitutes ‘rare event’              system able to converge at a higher rate µ
                                                     back to x∗ . Optimized RoQ attack begin anew,
 which adaptation system not expected to             forcing system to oscillate between x∗ and y∗ ,
 handle well                                         thereby degrading end system performance
Overview             Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Business Model Attack: Bagle Worm
       Background
       Email-born worm, first appearance in January 2004
       Prevalence Among the top 15 malware families found in wild
       2006/2007 (15%), 2009 (2-4%)

       Pertinent Modus Operandus
       Server-side metamorphic, outsourced engine [Inc07b]
       High variant-low instance release (10s of instances per variant)
       30,000 distinct variants, 625 average variants per day (01-02/2007)

       4th Order Attack: AV Economic Cost Structure (ROI)
           0
               th
                    order Vulnerable program on the end system
           1    order Host or server-based AV
               st

           2
             nd
                order End point of AV signature distribution system
           3
               th
                    order Start point of AV signature distribution system
           4
               th
                    order Economic incentives (ROI) of AV companies
Overview      Detection Approaches     Entropic Defense      Unholy Present/Future    Epilogue   Sources



Business Model: Bagle’s Strategy Illustrated




                   Figure: Bagle worm’s low instances per variant. Figure from [Inc07a]



       Assumption Violation: Sufficient ROI
       Premised on ROI Cost-effectiveness of signature development by
       high-cost analysts
       Ancillary System AV business model designed for more ‘typical’
       case of high-count, low-variance malware
       Rare Event Rapidly mutating, low-count malware instances
Overview     Detection Approaches       Entropic Defense     Unholy Present/Future   Epilogue   Sources



Supply Chain Attack: IC Malware




                          Figure: IC Manufacturing process. Picture from [DAR07]




       DARPA BAA07-024
       Determine whether IC manufactured in untrusted environment can be
       trusted to perform just operations specified and no more
Overview         Detection Approaches      Entropic Defense      Unholy Present/Future     Epilogue        Sources



Supply Chain Attack: Malicious IC: Write Enable on
Trigger




       Figure: Picture from [DAR07]. 09/06/2007: Israeli strike against Syrian nuclear reactor. Was a
       hardware kill switch used to disable air defense and radar systems? Precedent: Exocet missiles in
       1982 UK-Argentine Falkland war. Fake routers via Chinese suppliers 2006-2008 Cisco Raider
Overview             Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Human Operator Psychology Attack: Satan Malware
       Background
       Gedankenspiel Conceptual malware [BD06]
       Technically relatively simple Trojan

       Pertinent Modus Operandus
       Faust’s pact with Mephistoteles W sends program to Z, promising
       powers: Remotely browse X’s hard disk, read emails between X & Y
       Program delivers, but surreptitiously keeps log of Z’s activities
       and rummages through Z’s files
       After incriminating evidence gathered, program uses threats and
       bribes to get Z to propagate itself to next person

       1st or 2nd Order Subversion Attack: Psychological System
           0
               th
                    order Computer System
           1
               th
                    order Human Operator
           2
               th
                    order Psychological Ancillary System
Overview      Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



Human Operator Psychology Attack: SATAN Strategy
       Astounding Innovation: Symbiotic Human-Machine Code
       Malware code induces ‘production’ of more complex human
       code (propagation module) dynamically
       Invokes generative ‘factory routines’ evolutionary and social

       Artful Leveraging of Human Operator Subsystem
       Psychological Appeals to mix of neutral (curiosity, risk) to base
       (greed, lust for power) instincts, pressures using full gamut of shame,
       fear, cowardice and cognitive dissonance
       Cognitive Control Do a harmful thing convincingly
       Human Operator Harness own human operator subsystem to
       exploit human trust relation

       Assumption Violation: Friend Loyalty
       Premised on Trust Friends do not intentionally harm one another
       Ancillary Systems First psychological to entrap, then rational
       subsystem and human operator subsystem to propagate
       Rare Event Intentionally put in harm’s way by friend
Overview       Detection Approaches   Entropic Defense   Unholy Present/Future   Epilogue   Sources



My Advice to Learning

       Dream
       Inspiration Seek out seemingly disparate fields and look for
       communalities and differences
       Imagination As the first step, imagination is much more important
       than knowledge - think like Einstein

       Courage
       Dare to be bold Stake out a position, then argue scientifically,
       empirically and logically
       Be wrong at times You cannot grow if you do not take that chance

       Character
       Be humble There were smarter people before you, there will be
       smarter ones after you
       Be kind Being smart is easy, being kind is much harder
Overview    Detection Approaches   Entropic Defense         Unholy Present/Future    Epilogue        Sources



How Scientists Relax


  Little Humor
  Infrared spectroscopy on a
  vexing problem of our times:
  Truly comparing apples and
  oranges.

  Thank You
  Thank you for your time, the
  consideration of these ideas and
  inviting me to Sandia in
  beautiful New Mexico ⌣  ¨
                                                  Figure: A spectrographic analysis of ground, desiccated
                                                  samples of a Granny Smith apple and a Sunkist navel
                                                  orange. Picture from [San95]
Overview          Detection Approaches   Entropic Defense        Unholy Present/Future    Epilogue       Sources



Gameboard: Cyber Behavorial Genomics

  Innovations                                               Goals
  Behavioral characterizations Network                      Behavior Prediction Anticipate the next
  traffic, host processes, users and business                 activity of the entity under study
  processes                                                 Behavior Characterization Observe a
      0 th order atomic activities. Example:                behavior and classify it as belonging to a
           Lists of active processes and/or                 class of behaviors
           modified files on a host; lists of user            Anomaly detection Identify behavior
           applications and remote hosts contacted          changes quickly and robustly
           by users.
      1 st order 0th order behaviors with
           relative or absolute frequencies
           conditioned on time or optionally other
           non-behavioral events. Example:
           Frequencies of user applications and
           remote hosts contacted by users
      2 nd order : 1st order behaviors allowing
           conditioning on other behaviors.                 Figure: Example of 2nd order behavioral modeling:
           Examples: frequencies of sequences of            Markov Chain transition diagram and probabilities
           active processes; frequencies of                 for a single user’s browsing activity (David
           sequences of user applications and the           Robinson Ph.D. thesis [Rob10])
           remote hosts contacted by users
Overview       Detection Approaches   Entropic Defense           Unholy Present/Future      Epilogue         Sources



Gameboard: Visual User Interface

  Goals
  Probabilistic Scoring enables the user to
  intuitively understand the overall status of
  the game, the likelihood of scenarios, and
  the system with or without stimuli
  Multiple Perspectives presents game
  from point of view of the Defender,
  potentially adversarial and non-adversarial
  participant
  Who-What-When-Where Lens
  presents actionable, pre-processed state               Figure: Example of a visual continuum concept for
  and process view suitable for decisions                network data: VisAlert (left) provides a holistic view
                                                         of the network alerts on top of the network topology.
  within human cognitive parameters                      The Analysis visualization (right) is an enhanced
  Time Scaling covers 14 orders of                       scatter plot that allows to look at data details on
  magnitude from microseconds to years                   demand and verify hypotheses.
  Drill Down & Bird’s Eye let humans                     The Waterfall visualization (center) is a collection of
  examine decision reasoning of autonomic                hybrid histogram status bars that display in a
                                                         user-configured, collapsed time interval, the data to
  framework at various spatial scales and                see distributions and patterns, and serves as a bridge
  functional groupings                                   between VisAlert and Analysis
  Injection and Suggestions offers control
  of the game within human cognitive
  parameters.
Overview    Detection Approaches   Entropic Defense         Unholy Present/Future     Epilogue        Sources



Process Query System

Observe and Model
Process Query System [CB04]
New type of DBMS framework that
allows for process description
queries against internal models (FSM,
Petrinet, Hidden Markov, etc)

                                                      Figure: PQS process model is designed to solve the
Idea: Infer state                                     Discrete Source Separation Problem
Establish mapping between                             Processes have hidden states which emit observables.
observations and processes’ states                    Given observed events, et1 ; et2 ; . . . ; etn and a
                                                      collection of processes, {M1 ; M2 ; . . .}, solve

Processes detection Models of                         Process detection problem
                                                      “best” assignment of events to process instances
MW’s internal control structure                       f : {1; 2; . . . ; n} → N+ × N+
                                                      where f(i) = (j; k) means that event ei was caused by
State estimation Estimate the                         the k th instance of process model j

current control flow state the                         State estimation problem
malware is in                                         Corresponding internal states and state sequences of
                                                      the processes thus detected
Overview       Detection Approaches     Entropic Defense      Unholy Present/Future     Epilogue        Sources



References I
           Mike Bond and George Danezis, A pact with the devil, NSPW, ACM, 2006, pp. 77–82.

           Daniel Bilar, On callgraphs and generative mechanisms, Journal in Computer Virology 3
           (2007), no. 4.
                  , Opcodes as predictor for malware, International Journal of E-Security and Digital
           Forensics 1 (2007), no. 2.
                  , Degradation and subversion through subsystem attacks, IEEE Security & Privacy
           8 (2010), no. 4, 70–73.
           George Cybenko and Vincent Berk, An overview of process query systems, Proc. SPIE, vol.
           5403, 2004.
                  , Process detection in homeland security and defense applications, Proc. SPIE
           6201 (2006).
           Jean Carlson and John Doyle, Highly Optimized Tolerance: Robustness and Design in
           Complex Systems, Physical Review Letters 84 (2000), no. 11, 2529+.
           Christian Collberg and Jasvir Nagra, Surreptitious software: Obfuscation, watermarking,
           and tamperproofing for software protection, Addison-Wesley Professional, 2009.
           Aaron Clauset, Cosma R. Shalizi, and Mark Newman, Power-Law Distributions in Empirical
           Data, SIAM Reviews (2007).
           Aaron Clauset, Cosma R. Shalizi, and M. E. J. Newman, Power-law distributions in
           empirical data, SIAM Review 51 (2009), no. 4, 661+.
Overview       Detection Approaches     Entropic Defense      Unholy Present/Future      Epilogue     Sources



References II

           Stephen Checkoway, Hovav Shacham, and Eric Rescorla, Are text-only data formats safe?
           or, use this LTEX class file to pwn your computer, Proceedings of LEET 2010 (Michael
                          A
           Bailey, ed.), USENIX, April 2010, To appear.
           Werner Dahms, Technology Horizons: A Vision for Air Force Science & Technology
           During 2010-2030, Tech. report, USAF Science and Technology, May 2010,
           http://www.aviationweek.com/media/pdf/UnmannedHorizons/Technologys
           DARPA, TRUST in integrated circuits, 2007, http://tinyurl.com/3y7nno.

           Éric Filiol, Computer viruses: from theory to applications, Springer, 2005.

           Mina Guirguis and Azer Bestavros, Adversarial Exploits of End-Systems Adaptation
           Dynamics, Journal of Parallel and Distributed Computing 67 (2007), no. 3, 318–335.
           Commtouch Inc, Malware outbreak trend report: Bagle-worm, Tech. report, March 2007,
           accessed Oct. 17th , 2007.
                  , Server-side polymorphic viruses surge past av defenses, Tech. report, May 2007,
           accessed Oct. 17th , 2007.
           Gregoire Jacob and Eric Filiol, Malware As Interaction Machines, J. Comp. Vir. 4 (2008),
           no. 2.
           Lisa Manning, Jean Carlson, and John Doyle, Highly Optimized Tolerance and Power Laws
           in Dense and Sparse Resource Regimes, Physical Review E 72 (2005), no. 1, 16108+.
Overview       Detection Approaches     Entropic Defense     Unholy Present/Future     Epilogue        Sources



References III



           Robert K. Niven, Combinatorial Information Theory: I. Philosophical Basis of
           Cross-Entropy and Entropy, ArXiv (2007).
           Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, Return-oriented
           programming: Systems, languages, and applications, 2009, In review.
           Chris Ries, Automated identification of malicious code variants, J. Comput. Small Coll. 20
           (2005), no. 5, 140–141.
           David Robinson, Cyber-behavioral modeling, Ph.D. thesis, Dartmouth College (Thayer
           School Of Engineering), July 2010.
           Scott Sandford, Apples and oranges: a comparison, Annals of Improbable Research 1 (1995),
           no. 3.
           Michael E. Locasto Yingbo Song and Salvatore J. Stolfo, On the infeasibility of modelling
           polymorphic shellcode, ACM CCS, 2007, pp. 541–551.

Contenu connexe

En vedette

Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadanamblasec
 
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~Kazuyuki Kato
 
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEMsandralobo49
 
What are the myths associated with hiv
What are the myths associated with  hivWhat are the myths associated with  hiv
What are the myths associated with hivangelique_stjulian
 
Science Chapter 01 Presentation
Science Chapter 01 PresentationScience Chapter 01 Presentation
Science Chapter 01 PresentationSusan Parkhurst
 
Affordable Care Act Briefing, Joanne Grossi, LWVMCVA
Affordable Care Act Briefing, Joanne Grossi, LWVMCVAAffordable Care Act Briefing, Joanne Grossi, LWVMCVA
Affordable Care Act Briefing, Joanne Grossi, LWVMCVAcalindstrom
 
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions AssuranceMonitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions Assurancenamblasec
 
Bio-op Errors in DNA Computing
Bio-op Errors in DNA ComputingBio-op Errors in DNA Computing
Bio-op Errors in DNA Computingnamblasec
 
Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...namblasec
 
kintone Cafe 横浜 Vol.1
kintone Cafe 横浜 Vol.1kintone Cafe 横浜 Vol.1
kintone Cafe 横浜 Vol.1Kazuyuki Kato
 
On self-reproducing computer programs
On self-reproducing computer programsOn self-reproducing computer programs
On self-reproducing computer programsnamblasec
 
Modelos de convite para festa junina(slide)
Modelos de convite para festa junina(slide)Modelos de convite para festa junina(slide)
Modelos de convite para festa junina(slide)sandralobo49
 
The Process of The Scientific Method
The Process of The Scientific MethodThe Process of The Scientific Method
The Process of The Scientific MethodSusan Parkhurst
 

En vedette (15)

Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
 
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
 
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM
1ºANO DA ESCOLA MADALENA RAAD NAS PROVAS DO ENEM
 
What are the myths associated with hiv
What are the myths associated with  hivWhat are the myths associated with  hiv
What are the myths associated with hiv
 
Science Chapter 01 Presentation
Science Chapter 01 PresentationScience Chapter 01 Presentation
Science Chapter 01 Presentation
 
Affordable Care Act Briefing, Joanne Grossi, LWVMCVA
Affordable Care Act Briefing, Joanne Grossi, LWVMCVAAffordable Care Act Briefing, Joanne Grossi, LWVMCVA
Affordable Care Act Briefing, Joanne Grossi, LWVMCVA
 
Cloud2009
Cloud2009Cloud2009
Cloud2009
 
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions AssuranceMonitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions Assurance
 
Bio-op Errors in DNA Computing
Bio-op Errors in DNA ComputingBio-op Errors in DNA Computing
Bio-op Errors in DNA Computing
 
Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...
 
kintone Cafe 横浜 Vol.1
kintone Cafe 横浜 Vol.1kintone Cafe 横浜 Vol.1
kintone Cafe 横浜 Vol.1
 
Estatuts AMPA Llar coloraines
Estatuts AMPA Llar colorainesEstatuts AMPA Llar coloraines
Estatuts AMPA Llar coloraines
 
On self-reproducing computer programs
On self-reproducing computer programsOn self-reproducing computer programs
On self-reproducing computer programs
 
Modelos de convite para festa junina(slide)
Modelos de convite para festa junina(slide)Modelos de convite para festa junina(slide)
Modelos de convite para festa junina(slide)
 
The Process of The Scientific Method
The Process of The Scientific MethodThe Process of The Scientific Method
The Process of The Scientific Method
 

Similaire à Defending against Adversarial Cyberspace Participants

Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT GroupCXT Group
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierIRJET Journal
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Shakas Technologies
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Auditsijseajournal
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenSecurityGen1
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurityGen1
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecurityGen1
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurity Gen
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 

Similaire à Defending against Adversarial Cyberspace Participants (20)

Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning Classifier
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
185
185185
185
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Audits
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security Solutions
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 

Dernier

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Defending against Adversarial Cyberspace Participants

  • 1. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Defending against Adversarial Cyberspace Participants by Morphing The Gameboard Daniel Bilar University of New Orleans Department of Computer Science Sandia National Labs Cyber Security Forum Albuquerque, NM October 7, 2010
  • 2. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Speaker A bit about me Domicile Born in the US, grew up in Germany, France, mostly Switzerland. Came to the US for post-secondary studies. Been here almost twenty years Education Business, law, economics; philosophy, history, political science, computer science; operations research, industrial engineering, engineering sciences, theology Work Salesman, software engineer, financial analyst, consultant, college/university professor. Research Field: Security Studies Background As PhD student, founding member of the Institute for Security and Technology Studies at Dartmouth (counter-terror, defense research for US DoJ and US DHS) Security Studies Solutions cannot be mere math/technical - spans different dimensions such as psychology, technology, computer science, operations research, history, law, sociology and economics Funding DoD/NSA, NASA, Navy SPAWAR, Louisiana BoR
  • 3. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Talk Roadmap Status Quo Classic AV byte-pattern matching has reached its practical and theoretical limits with modern malware Why? Problem Setup favors Adversary They pose hard problems Through design dissimulation techniques, their functionality and intent difficult to ascertain We are easy Targets situated on a predominantly WYSIWYG “gameboard” → Defenses forced to solve time-intensive (minutes, hours, days) halting problems while adversarial cyberspace participants do not Hence, have to turn tables to achieve required subsecond defense responses Autonomous Baiting, Control and Deception (ABCD) Inversion of Problem Setup By means of morphing adversary’s view of gameboard, increase adversarial participant’s footprint, noise levels, decision complexity Bait, Control and Deceive By means of a repeated dynamic stimuli-response game, framework decides probabilistically nature of participant and engages appropriate defensive measures End vision AI-assisted, sub-second decision cycle, autonomic stimuli response framework that probabilistically determines, impedes, quarantines, subverts, possibly attributes and possibly inoculates against suspected adversarial cyberspace participants
  • 4. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Signals from Above AF Chief Scientist Werner Dahms on USAF Science & Technology 2010-2030 [Dah10] Augmentation of Human Performance Use of highly adaptable autonomous systems to provide significant time-domain operational advantages over adversaries limited to human planning and decision speeds Massive virtualization Agile hypervisors, inherent polymorphism complicate adversary’s ability to plan and coordinate attacks by reducing time over which networks remain static, and intruder to leave behind greater forensic evidence for attribution. Resilience Make systems more difficult to exploit once entry is gained; cyber resilience to maintain mission assurance across entire spectrum of cyber threat levels, including large-scale overt attacks Symbiotic Cyber-Physical-Human Augmentation through increased use of autonomous systems and close coupling of humans and automated systems Direct augmentation of humans via drugs or implants to improve memory, alertness, cognition, or visual/aural acuity, screening (brainwave patterns or genetic correlators) 2011 IEEE Symposium on Computational Intelligence in Cyber Security (April 2011) Mission Assurance Track Explore theoretical and applied research work in the academic, industrial, and military research communities related to mission assurance. Selected Topics Mission representation, modeling, simulation, visualization, impact estimation and situational awareness; Decision making and decision support; Engineering for mission assurance and resilience strategies.
  • 5. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Detection Rates: Malware Increasingly Resistant Bad: Empirical AV Results Report Date AV Signature Update MW Corpus Date False Negative (%) 2010/05 Feb. 10th Feb. 11th -18th [37-89] 2010/02 Feb. 10th Feb. 3rd [0.4-19.2] 2009/011 Aug. 10th Aug. 11th -17th [26-68] 2009/08 Aug. 10th Aug. 10th [0.2-15.2] 2009/05 Feb. 9th Feb. 9th -16th [31-86] 2009/02 Feb. 9th Feb. 1st [0.2-15.1] 2008/11 Aug. 4th Aug. 4th -11th [29-81] 2008/08 Aug. 4th Aug. 1st [0.4-13.5] 2008/05 Feb. 4th Feb. 5th -12th [26-94] 2008/02 Feb. 4th Feb. 2nd [0.2-12.3] Table: Empirical miss rates for sixteen well-known, reputable AV products (AV-Comparatives.org). After failing to update signatures for one week, the best AV missed between 26-31 % of the new malicious software, the worst missed upwards of 80 % Worse: Theoretical Findings Hitherto tractable linear time struggling against NP-completeness and undecidability. Detection of interactive malware is at least in complexity class NPoracle NPoracle NP [EF05, JF08] Blacklisting Deadend Infeasibility of modeling polymorphic shellcode [YSS07]
  • 6. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources 1st Fingerprint: Win32 API Calls Synopsis Observe and record Win32 API calls made by malicious code during execution, then compare them to calls made by other malicious code to find similarities Goal Classify malware quickly into a family Set of variants make up a family Main Result (2005) [Rie05] Simple (tuned) Vector Space Model yields over 80% correct classification Behaviorial angle seems promising
  • 7. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Win32 API Calls: Results Figure: Threshold parameter Classification and AV Corroboration Classification by 17 AV scanners yields 21 families. > 80 % correspondence (csm Figure: 77 malware samples threshold = 0.8). classified
  • 8. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources 2nd Fingerprint: Opcode Frequency Synopsis Statically disassemble the binary, tabulate the opcode frequencies and construct a statistical fingerprint with a subset of said opcodes Goal Compare opcode fingerprint across non-malicious software and malware classes for quick identification purposes Main Result (2006) [Bil07b] For differentiation purposes, infrequent opcodes explain more data variation than common ones Static makeup Not good enough as discriminator. Exacerbating: ROP [RBSS09][CSR10], ‘malicious computation’ (Sept. 2010: Adobe 0-day CVE-2010-2883 used ROP attack to bypass DEP)
  • 9. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources 3rd Fingerprint: Callgraph Properties Synopsis Represent executables as callgraph, and construct graph-structural fingerprint for software classes Goal Compare ‘graph structure’ fingerprint of unknown binaries across non-malicious software and malware classes Main Result (2007) [Bil07a] Malware tends to have a lower basic block count, implying a simpler functionality: Less interaction, fewer branches, limited goals Behavioral Angle Can we use simpler decision structure to ‘outplay’ malware?
  • 10. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Callgraph: Overview Procedure 1 Booted VMPlayer with XP image a Goodware: Sampled 280 files from XP box b Malware: Fixed 7 classes and sampled 120 specimens 2 Structural parsing with IDA (with FLIRT) and IDAPython 3 Structural data into MySQL 4 Analyzed callgraph data with BinNavi, Python and Matlab
  • 11. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Callgraph: Degree Distribution Power (Pareto) Law Investigate whether indegree dindeg (f), outdegree doutdeg (f) and basic block count dbb (f) distributions of executable’s functions follows a truncated power law of form m αd∗ (f) − kc Pd∗ (f) (m) ∼ m e with α a power law exponent, kc distribution cutoff point, α(n) Hill estimator (inset) used ˆ for consistency check [CSN09] Figure: Pareto fitted ECCDF with Hill estimator α(n) ˆ
  • 12. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Callgraph: Flowgraph Example Metrics Collected Basic block count of function Instruction count of a given basic block Function ‘type’ as normal, import, library, thunk In- and out-degree of a given function Function count of executable Figure: Backdoor.Win32.Livup.c: Flowgraph of sub_402400, consisting of six basic blocks. The loc_402486 basic block is located in the middle of the flowgraph given above
  • 13. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Backdoor.Win32.Livup sub_402400 callgraph Metrics Collected Basic block count of function Instruction count of a given basic block Function ‘type’ as normal, import, library, thunk In- and out-degree of a given function Function count of executable Figure: Callgraph of sub_402400: Indegree 2, outdegree 6
  • 14. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Callgraph: α Ranges Figure: αindeg = [1.5 − 3], αoutdeg = [1.1 − 2.5]andαbb = [1.1 − 2.1], with a greater spread for malware
  • 15. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Callgraph: Differentiation Results class Basic Block Indegree Outdegree t 2.57 1.04 -0.47 Goodware N(1.634,0.3) N(2.02, 0.3) N(1.69,0.307) Malware N(1.7,0.3) N(2.08,0.45) N (1.68,0.35) Table: Only one statistically relevant difference found: Basic block distribution metric µmalware (kbb ) = µgoodware (kbb ) via Wilcoxon Rank Sum Interpretation Malware tends to have a lower basic block count, implying a simpler functionality: Less interaction, fewer branches, limited functionality Idea Kasparov wins games because he can think 5-7 moves ahead. Can we use simpler decision structure to outplay simpler malware?
  • 16. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Conceptual: Actively Morphing, Game-Playing Defense Framework Idea: Subversion of Decision Loop Interactive, morphing framework to manipulate, mislead and contain MW. Infer MW internal decision points, then change the environment (i.e. passive environmental morphing and active environmental stimuli), thus manipulating the observables malware might use for its decisions. Environment plays an iterative, seemingly cooperative, mixed Figure: The environment and the malware can be strategy, multi-player game. seen as engaged in an iterative, seemingly Goal Subvert MW’s internal control cooperative, possibly mixed strategy, possibly multi-player game. Can I identify, quantify and structure and goad it into a position deploy strategies (i.e. passive environmental favorable to the defense. morphing and active environmental stimuli) to goad malware into a payoff corner?
  • 17. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD-ACP: Defending Against Adversarial Cyberspace Participants Figure: Morphing the Gameboard and Engaging Potentially Adversarial Cyberspace Participants
  • 18. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD-ACP: Characteristics Goals Continuous Evolution and Adaptation of interaction strategies through algorithms (machines) and intuition (human crowdsourcing) Resilience against subversive participants seeking to undermine strategies Continuous increase in decision Figure: Engagement Gameboard: Participants cycle speed from seconds to operate on a gameboard injected with stimuli. microseconds Aggressive Through dynamic re-configuration of the virtualized environment through baits/stimuli and optimization over all framework responses, influence potential adversarial components, workflow and bottlenecks participants (both humans and programs) perception of environment, control behavior and Stability Guarantees DoD network goad it into a position favorable to the defense. sizes through rigorous mathematical analysis and simulation
  • 19. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Morphing the Gameboard: Concepts Overview Gameboard consists of virtualized operating environment (we use VMWare) into which bait/stimuli are injected to induce potential ACP’s (both humans and programs) to ‘show their colors’ Probabilistic identification via stimuli/responses ‘game’. Serves to weigh different hypotheses (ex: loglikelihood Bayesian odds) consistent with aggregate evidence whether a participant’s observed behavior can be classified as adversarial Baits/Stimuli Gameboard-morphing actions taken by Defender to induce behavioral responses from participants. Specificity (low false positives are desired: Does it flag benevolent participants as adversarial?) and sensitivity (low false negatives are desired: Does it miss adversarial participants?) Morphing the Gameboard Influence ACP’s perception of the environment, and goad it into a position favorable to the defense Hypotheses 1 From observations of stimuli/responses, uncertainty viz unknown intent can be reduced. In particular, potential adversarial participants can be probabilistically identified. 2 Defender can control the behavior of ACPs by influencing their perception of the Gameboard to the defense’s benefit
  • 20. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Morphing the Gameboard: Concepts Players System Set of benign processes on the Gameboard. Defender does not know this benevolence a priori Participants Potentially adversarial programs or humans on the Gameboard. Defender does not know this a priori Defender Morphs the Gameboard with stimuli, assesses responses, and engages defense actions. Defender is part of the System, and is able to distinguish its own responses from the rest of the System Defensive Actions Defender conversation consists of a high level scenario which is either preemptively engaged, chosen by the user, or activated by other defensive systems. Conversation examples include “Worm”, “Rootkit”, “Bot”, “Trojan” and more. Defender scenario informs one or more engagement types. Engagement type examples include “present spread vectors”, “present confidentiality vectors”, “present reconnaissance vectors”, “present weakened defenses”, “change system parameters” and more. For each engagement type, Defender autonomously chooses a dynamic engagement strategy Engagement Strategy Game tree aggregate of baits (stimuli) and participants. Dynamic game tree because depending on the reaction of the potential malicious activity, next bait/stimuli dynamically chosen.
  • 21. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Morphing the Gameboard: Baits Baits Portfolio Bait Bait actions Malware Ex. False Positive Dummy Inject false antivirus pro- Conficker (kills AV pro- low processes grams into the OS process cesses), Bugbear (shuts list and monitor for halt in down various AV pro- execution cesses), Vundo (disables Norton AV) Network Mounts and removes net- MyWife.d (attempt to delete medium Shares work shares on the client System files on shared then monitors for activity network drives), Lovgate (copies itself to all network drives on an infected com- puter), Conficker (infects all registered drives) Files Monitors critical or bait Mydoom.b (alters host file to low (.doc, .xls, .cad) files block web traffic), MyWife.d (deletes AV system pro- grams), Waledac.a (scans lo- cal drives for email adds ) User action Executes normal user be- Mydoom.b (diverts network high havior on the client system traffic thus altering what is and monitors for unusual expected to appear), Vundo execution (eat up system resources - slows program execution) Table: Baits implemented so far for Gameboard
  • 22. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Morphing the Gameboard: Defender Defender Goals Defender Action Mission assurance/continuity Defender should not Abstract Categories Collberg’s [primitives] self-sabotage or sabotage System’s mission. Mission (cover, duplicate, split/merge, reorder, map, continuity constraints include but are not limited to: indirect, mimic, advertise, detect/ response, sustain mission availability, confidentiality, integrity, dynamic) [CN09] authenticity and more. Quarantine [Indirect] Defender moves Actionable Information Gain: Defender’s responses Participant to an instrumented but isolated geared towards learning more about the potential platform in order to learn more about its adversarial participant (e.g. by migrating ACP into a behavior. highly instrumented environment). (Self-)terminate [Tamperproof ] Defender Defender Stealth Potentially adversarial participant terminates Participant or induces its should remain unaware of Defender’s observation and self-termination. In addition, Defender may manipulation of ACP’s view of Gameboard simulate termination of benign System Subversion Defender responds in such a way as to components as a strategic mimetic move (such repurpose the ACP as unlinking it from the process table). Participant Attribution Defender responds in such a Holodeck [Mimicry, Tamperproof ] way that attribution of adversarial behavior source is Defender presents ”critical” or ”strained” made more likely (e.g. smart watermarking/ poisoning Gameboard state in an effort to violate ACP’s of data). expectation (e.g. 99% memory utilization, Inoculation Defender can synthesize a general modus heavy network congestion, no heap space left). operandus over observed behavior to build a vaccine, Subversion [Tamperproof ]: supplementing efforts in the realm of byte code Data-taint/poison potential ACP in order to signatures. create an attribution trail. Especially important for military defense systems, where attackers try to plausibly deny responsibility through one of more levels of indirection.
  • 23. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD Validation Overview Five Measurable Milestones Decision cycle speed Median from time of the first response of the potentially adversarial participants to the first defensive action implemented False positives are benign participants whom the framework classifies as adversarial False known negatives are known adversarial programs that the framework fails to classify as such False 0-day negatives are gold standard: Never-seen-before attacks by humans and programs Figure: ABCD Metrics and Milestones: 4 years
  • 24. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD Year 1 Year 1: Framework Proof of Concept Develop optimization-instrumented framework elements (baits/ responses/ defense strategies/ action) Validate and measure Bait (False positives, false negatives), defense strategies/actions and decision cycle time Implementation Choke points Dead ends and R& D towards year 2 System stability analysis Non-linearities, self-DoS Figure: ABCD Metrics and Milestones: 4 years
  • 25. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD Year 2 Year 2: Two-Pronged Game Strategy Evolution Push Improve Incorporate stimuli/ response/ defense validation results Algorithmic R & D recombinant machine strategy evolution framework Human, R & D human crowdsourcing game to harvest intuitions/moves strategies Wargames (1983) Evolve strategies by deploying PoC evolution framework on supercomputer Mathematical System Analysis Stability, Scalability Transition Begin developing transition roadmap to real life systems Figure: ABCD Metrics and Milestones: 4 years
  • 26. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD Year 3 Year 3: ABCD-ACP Framework 2.0 Upgrade With stability, scalability, validation, strategy results, redesign V2 of ABCD-ACP framework Integration Human/machine strategies evolution mechanism and defense into ABCD-ACP 2.0 Subversion R & D into resilience of ABCD-ACP against subversive players (evolution of malicious adversarial participants) Transition Continue developing transition roadmap to real life systems Production Push R & D into metrics and milestone for year 4 Figure: ABCD Metrics and Milestones: 4 years
  • 27. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources ABCD Year 4 Year 4: ABCD-ACP Framework 3.0 Validation Resiliency of ABCD-ACP 3.0 against subversive players Update and Check Survey threat horizon, incorporate and validate bait/response/defenses Upgrade With stability, scalability, validation, strategy results, redesign 3.0 of ABCD-ACP framework Mathematical System Analysis Stability, Scalability Tech transfer Transfer ABCD-ACP project: Decision control system (stimuli-response framework), knowledge base (bait and defense strategies) and evolution mechanism to DoD real life system Figure: ABCD Metrics and Milestones: 4 years
  • 28. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Theoretical and Implementation Challenges Ahead “A problem worthy of attack proves its worth by fighting back” Bait specificity and sensitivity Need empirical quantification with robust bait portfolio Multiple ACPs Implicitly assume just one ACP operating at a time - multiple ACPs gives Discrete Source Separation Problem. Promising approach is Process Query Systems [CB06] Computational Learning Need to analyze and control the rate of convergence. Informal goal is ACP identification with 2-4 bait/stimuli/response moves. Learning through interaction as a validation mechanism has been studied using, for instance, PAC or Vapnik-Chervonenkis theory Stochastic Imperfect Information Game Payoff tied to knowledge, varies over time, retroactively. Is this analytically solvable or maybe a good heuristic? Morphing Fundamentals System state, entropy measures, and multi-objective optimization problem (stability, management) Performance Open question whether aggressive metrics can be met (will seek inspiration from financial trading)
  • 29. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Morphing Ground Truth: System’s Degrees of Freedom System State and Entropy Measures Defense goal is not to maximally confuse ACP, but to manipulate malware’s decision tree by controlling its cross-entropy calculus Dx of perceived target/environment. Requires appropriate state representation of Gameboard and entities, since this directly determines cross-entropy measure Dx Ex: If system’s governing distribution (probability of given realization) P = P(ni |qi , N, s, I) s.t. prior probabilities qi , number of entities N, number of states Xs s with ni = N and background information I is i=1 Y q ni s multinomial with P = N! i , then i=1 ni ! Figure: Model of Maxwell-Boltzmann (a-b), (c) Bose-Einstein and (d) Fermi-Dirac systems cross-entropy to manipulate is Kullback-Leibler X“s ” a) N distinguishable balls to s disting. boxes, with ni of each state → PMB x −1 −1 DKL = pi N ln N! + pi ln qi − N ln((pi N)!) is multinomial b) Urn has M disting. balls, with mi of each state, sample N balls with i=1 replacement with ni in each state → PMB is multinomial However, if system is not governed by multinomial P (e.g. Bose-Einstein system’s PBE is multivariate gi +ni −1 “ ” c) Balls indistinguishable, permutations of ni indisting. balls in ni negative hypergeometric), Dx is not KL BE gi disting. boxes → PBE is multivariate negative hypergeometric gi “ ” d) Balls indistinguishable, max. 1 in each level, permutations of ni ni Cross-entropy Dx and Shannon entropy not KL indisting. balls in gi disting. boxes with ni ∈ {0, 1} → PFD is universal, do not apply to every system [Niv07] multivariate hypergeometric
  • 30. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Future Future End Vision of ABCD-ACP ‘Skynet’ AI-assisted, microsecond decision cycle, autonomic stimuli response framework that probabilistically determines, impedes, quarantines, subverts, possibly attributes and possibly inoculates against suspected adversarial cyberspace participants Human Symbiosis Co-evolution into an autonomous defense ‘alter ego’ for human decision makers. Coupled with stress (emotion) sensors poised to take over when judgment is deemed to be too affected by emotions andor information overload → Spirit of USAF Science & Technology 2010-2030 [Dah10]) Complements Efforts In Other Military Domains DARPA’s Integrated Battle Command (BAA 05-14) Give decision aids for battle operations DARPA’s Real-Time Adversarial Intelligence & Decision Making (BAA 04-16) Help battlefield commander with threat predictions in tactical operation Israel’s Virtual Battle Management AI Robotic AI defense system take over from flesh-and-blood operators. In event of doomsday strike, system handles attacks that exceed physiological limits of human command Why Emphasis on Autonomous Decision? Human Operator is Subsystem Possible to degrade and subvert end system through subsystem attacks
  • 31. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Subsystem Subversion: nth Order Attacks Objective Induce Instabilities in mission-sustaining ancillary systems that ultimately degrade, disable or subvert end system n: Degree of relation 0th order targets the end system, 1st order targets an ancillary system of the end system, 2nd order an ancillary system of the ancillary system etc. Systems Definition A whole that functions by virtue of interaction between constitutive components. Defined by relationships. Components may be other systems. Key points: Open, isomorphic laws Nature Technical, algorithmic, societal, psychological, ideological, economic, biological and ecological possible Examples Resource allocation / throughput control, manufacturing, visualization environments, social welfare systems, voting systems, data / goods / energy generation/ transmission/ distribution, reputation management, entropy externalization, business models and economic systems
  • 32. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Systems, Attacks and Assumption Violation Assumptions Fundamentally, attacks work because they violate assumptions Finite (i.e real life engineered or evolved) systems incorporate implicit/explicit assumptions into structure, functionality, language System geared towards ‘expected’, ‘typical’ cases Assumptions reflect those ‘designed-for’ cases Intuitive Examples of Attacks and Assumption Violations Man-in-Middle Attacks Identity assumption violated Race Condition Attacks Ordering assumption violated BGP Routing Attacks Trust assumption violated Generative Mechanism and Assumptions Optimization process incorporating tradeoffs between objective functions and resource constraints under uncertainty Some assumptions generated by optimization process
  • 33. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Optimization Process: Highly Optimized Tolerance HOT Background Probability, Loss, Resource Generative first-principles approach Optimization Problem [MCD05] proposed to account for power laws m P(m) ∼ mα e− kc in natural/engineered min J (1) systems [CSN07, CD00] subject to Optimization model incorporates tradeoffs between objective functions and X ri ≤ R (2) resource constraints in probabilistic environments where Used Forest, internet traffic, power and J = X pi li (3) immune systems li = f(ri ) (4) 1 ≤ i≤M (5) Pertinent Trait M events (Eq. 5) occurring iid with probability Robust towards common perturbations, pi incurring loss li (Eq. 3) Sum-product is objective function to be but fragile towards rare events minimized (Eq. 1) Inducing ‘rare events’ in ancillary Resources ri are hedged against losses li , with normalizing f(ri ) = − log ri (Eq. 4), subject to systems is goal of nth order attack resource bounds R (Eq. 2).
  • 34. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Subsystem Attacks: Examples Target Ancillary System to Subvert End Systems [Bil10] P2P Networks RoQ attacks can be mounted against distributed hash tables used for efficient routing in structured P2P networks through join/leave collusions and bogus peer newcomer notifications Power Grid Load balancing in electricity grids relies on accurate state estimation. Data integrity attacks on a chosen subset of sensors make these estimates unreliable, which could push such feedback systems into unstable state Democracy Voting systems assume honest participants vote their actual preference. In elections with more than two candidates, system can be undermined by strategic voting, targeting the ranking process subsystem Trusted Code Second-order control-flow subversion attack termed return-oriented programming (ROP) induce innocuous code to perform malicious computations Financial Exchange Advent of high-frequency trading infrastructures (physically collocated, hence low latency) gave rise to trading approaches (first- and second-order degradation and subversion attacks) targeting the Efficient Market Hypothesis and its subsystems
  • 35. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Adaptation System Attack: Network Protocols Reduction-of-Quality Attack [GB07] 1st or 2nd order degradation attack; targets adaptation mechanisms of network protocols M.O. Non-DoS, low-bandwidth traffic maliciously optimized against admission controllers and load balancers Forces adaptive mechanism to oscillate between over- and under-load condition → degrades end system Figure: Oscillation between high system steady state rate x∗ and lower system steady performance state y∗ . Assume system services requests at a Assumption violation ‘Normal traffic’ high steady state rate x∗ , thanks to its adaptation subsystem that seeks to optimize requests service rates. RoQ attack (burst time t shaded) Rare event RoQ attack’s δ requests per push system from x∗ , which then slowly convergences at rate ν to lower steady state second for burst time t (shaded) repeated y∗ . Since attacks ceased, after some time, over period T constitutes ‘rare event’ system able to converge at a higher rate µ back to x∗ . Optimized RoQ attack begin anew, which adaptation system not expected to forcing system to oscillate between x∗ and y∗ , handle well thereby degrading end system performance
  • 36. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Business Model Attack: Bagle Worm Background Email-born worm, first appearance in January 2004 Prevalence Among the top 15 malware families found in wild 2006/2007 (15%), 2009 (2-4%) Pertinent Modus Operandus Server-side metamorphic, outsourced engine [Inc07b] High variant-low instance release (10s of instances per variant) 30,000 distinct variants, 625 average variants per day (01-02/2007) 4th Order Attack: AV Economic Cost Structure (ROI) 0 th order Vulnerable program on the end system 1 order Host or server-based AV st 2 nd order End point of AV signature distribution system 3 th order Start point of AV signature distribution system 4 th order Economic incentives (ROI) of AV companies
  • 37. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Business Model: Bagle’s Strategy Illustrated Figure: Bagle worm’s low instances per variant. Figure from [Inc07a] Assumption Violation: Sufficient ROI Premised on ROI Cost-effectiveness of signature development by high-cost analysts Ancillary System AV business model designed for more ‘typical’ case of high-count, low-variance malware Rare Event Rapidly mutating, low-count malware instances
  • 38. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Supply Chain Attack: IC Malware Figure: IC Manufacturing process. Picture from [DAR07] DARPA BAA07-024 Determine whether IC manufactured in untrusted environment can be trusted to perform just operations specified and no more
  • 39. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Supply Chain Attack: Malicious IC: Write Enable on Trigger Figure: Picture from [DAR07]. 09/06/2007: Israeli strike against Syrian nuclear reactor. Was a hardware kill switch used to disable air defense and radar systems? Precedent: Exocet missiles in 1982 UK-Argentine Falkland war. Fake routers via Chinese suppliers 2006-2008 Cisco Raider
  • 40. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Human Operator Psychology Attack: Satan Malware Background Gedankenspiel Conceptual malware [BD06] Technically relatively simple Trojan Pertinent Modus Operandus Faust’s pact with Mephistoteles W sends program to Z, promising powers: Remotely browse X’s hard disk, read emails between X & Y Program delivers, but surreptitiously keeps log of Z’s activities and rummages through Z’s files After incriminating evidence gathered, program uses threats and bribes to get Z to propagate itself to next person 1st or 2nd Order Subversion Attack: Psychological System 0 th order Computer System 1 th order Human Operator 2 th order Psychological Ancillary System
  • 41. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Human Operator Psychology Attack: SATAN Strategy Astounding Innovation: Symbiotic Human-Machine Code Malware code induces ‘production’ of more complex human code (propagation module) dynamically Invokes generative ‘factory routines’ evolutionary and social Artful Leveraging of Human Operator Subsystem Psychological Appeals to mix of neutral (curiosity, risk) to base (greed, lust for power) instincts, pressures using full gamut of shame, fear, cowardice and cognitive dissonance Cognitive Control Do a harmful thing convincingly Human Operator Harness own human operator subsystem to exploit human trust relation Assumption Violation: Friend Loyalty Premised on Trust Friends do not intentionally harm one another Ancillary Systems First psychological to entrap, then rational subsystem and human operator subsystem to propagate Rare Event Intentionally put in harm’s way by friend
  • 42. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources My Advice to Learning Dream Inspiration Seek out seemingly disparate fields and look for communalities and differences Imagination As the first step, imagination is much more important than knowledge - think like Einstein Courage Dare to be bold Stake out a position, then argue scientifically, empirically and logically Be wrong at times You cannot grow if you do not take that chance Character Be humble There were smarter people before you, there will be smarter ones after you Be kind Being smart is easy, being kind is much harder
  • 43. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources How Scientists Relax Little Humor Infrared spectroscopy on a vexing problem of our times: Truly comparing apples and oranges. Thank You Thank you for your time, the consideration of these ideas and inviting me to Sandia in beautiful New Mexico ⌣ ¨ Figure: A spectrographic analysis of ground, desiccated samples of a Granny Smith apple and a Sunkist navel orange. Picture from [San95]
  • 44. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Gameboard: Cyber Behavorial Genomics Innovations Goals Behavioral characterizations Network Behavior Prediction Anticipate the next traffic, host processes, users and business activity of the entity under study processes Behavior Characterization Observe a 0 th order atomic activities. Example: behavior and classify it as belonging to a Lists of active processes and/or class of behaviors modified files on a host; lists of user Anomaly detection Identify behavior applications and remote hosts contacted changes quickly and robustly by users. 1 st order 0th order behaviors with relative or absolute frequencies conditioned on time or optionally other non-behavioral events. Example: Frequencies of user applications and remote hosts contacted by users 2 nd order : 1st order behaviors allowing conditioning on other behaviors. Figure: Example of 2nd order behavioral modeling: Examples: frequencies of sequences of Markov Chain transition diagram and probabilities active processes; frequencies of for a single user’s browsing activity (David sequences of user applications and the Robinson Ph.D. thesis [Rob10]) remote hosts contacted by users
  • 45. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Gameboard: Visual User Interface Goals Probabilistic Scoring enables the user to intuitively understand the overall status of the game, the likelihood of scenarios, and the system with or without stimuli Multiple Perspectives presents game from point of view of the Defender, potentially adversarial and non-adversarial participant Who-What-When-Where Lens presents actionable, pre-processed state Figure: Example of a visual continuum concept for and process view suitable for decisions network data: VisAlert (left) provides a holistic view of the network alerts on top of the network topology. within human cognitive parameters The Analysis visualization (right) is an enhanced Time Scaling covers 14 orders of scatter plot that allows to look at data details on magnitude from microseconds to years demand and verify hypotheses. Drill Down & Bird’s Eye let humans The Waterfall visualization (center) is a collection of examine decision reasoning of autonomic hybrid histogram status bars that display in a user-configured, collapsed time interval, the data to framework at various spatial scales and see distributions and patterns, and serves as a bridge functional groupings between VisAlert and Analysis Injection and Suggestions offers control of the game within human cognitive parameters.
  • 46. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources Process Query System Observe and Model Process Query System [CB04] New type of DBMS framework that allows for process description queries against internal models (FSM, Petrinet, Hidden Markov, etc) Figure: PQS process model is designed to solve the Idea: Infer state Discrete Source Separation Problem Establish mapping between Processes have hidden states which emit observables. observations and processes’ states Given observed events, et1 ; et2 ; . . . ; etn and a collection of processes, {M1 ; M2 ; . . .}, solve Processes detection Models of Process detection problem “best” assignment of events to process instances MW’s internal control structure f : {1; 2; . . . ; n} → N+ × N+ where f(i) = (j; k) means that event ei was caused by State estimation Estimate the the k th instance of process model j current control flow state the State estimation problem malware is in Corresponding internal states and state sequences of the processes thus detected
  • 47. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources References I Mike Bond and George Danezis, A pact with the devil, NSPW, ACM, 2006, pp. 77–82. Daniel Bilar, On callgraphs and generative mechanisms, Journal in Computer Virology 3 (2007), no. 4. , Opcodes as predictor for malware, International Journal of E-Security and Digital Forensics 1 (2007), no. 2. , Degradation and subversion through subsystem attacks, IEEE Security & Privacy 8 (2010), no. 4, 70–73. George Cybenko and Vincent Berk, An overview of process query systems, Proc. SPIE, vol. 5403, 2004. , Process detection in homeland security and defense applications, Proc. SPIE 6201 (2006). Jean Carlson and John Doyle, Highly Optimized Tolerance: Robustness and Design in Complex Systems, Physical Review Letters 84 (2000), no. 11, 2529+. Christian Collberg and Jasvir Nagra, Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection, Addison-Wesley Professional, 2009. Aaron Clauset, Cosma R. Shalizi, and Mark Newman, Power-Law Distributions in Empirical Data, SIAM Reviews (2007). Aaron Clauset, Cosma R. Shalizi, and M. E. J. Newman, Power-law distributions in empirical data, SIAM Review 51 (2009), no. 4, 661+.
  • 48. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources References II Stephen Checkoway, Hovav Shacham, and Eric Rescorla, Are text-only data formats safe? or, use this LTEX class file to pwn your computer, Proceedings of LEET 2010 (Michael A Bailey, ed.), USENIX, April 2010, To appear. Werner Dahms, Technology Horizons: A Vision for Air Force Science & Technology During 2010-2030, Tech. report, USAF Science and Technology, May 2010, http://www.aviationweek.com/media/pdf/UnmannedHorizons/Technologys DARPA, TRUST in integrated circuits, 2007, http://tinyurl.com/3y7nno. Éric Filiol, Computer viruses: from theory to applications, Springer, 2005. Mina Guirguis and Azer Bestavros, Adversarial Exploits of End-Systems Adaptation Dynamics, Journal of Parallel and Distributed Computing 67 (2007), no. 3, 318–335. Commtouch Inc, Malware outbreak trend report: Bagle-worm, Tech. report, March 2007, accessed Oct. 17th , 2007. , Server-side polymorphic viruses surge past av defenses, Tech. report, May 2007, accessed Oct. 17th , 2007. Gregoire Jacob and Eric Filiol, Malware As Interaction Machines, J. Comp. Vir. 4 (2008), no. 2. Lisa Manning, Jean Carlson, and John Doyle, Highly Optimized Tolerance and Power Laws in Dense and Sparse Resource Regimes, Physical Review E 72 (2005), no. 1, 16108+.
  • 49. Overview Detection Approaches Entropic Defense Unholy Present/Future Epilogue Sources References III Robert K. Niven, Combinatorial Information Theory: I. Philosophical Basis of Cross-Entropy and Entropy, ArXiv (2007). Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, Return-oriented programming: Systems, languages, and applications, 2009, In review. Chris Ries, Automated identification of malicious code variants, J. Comput. Small Coll. 20 (2005), no. 5, 140–141. David Robinson, Cyber-behavioral modeling, Ph.D. thesis, Dartmouth College (Thayer School Of Engineering), July 2010. Scott Sandford, Apples and oranges: a comparison, Annals of Improbable Research 1 (1995), no. 3. Michael E. Locasto Yingbo Song and Salvatore J. Stolfo, On the infeasibility of modelling polymorphic shellcode, ACM CCS, 2007, pp. 541–551.