Ali Dehghantanha; www.AliD.info; ALID@ALID.info Myths and Truths: Cyber Threat Hunting and Intelligence in IoT Environments Ali Dehghantanha; www.AliD.info;

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

[Name / Title] [Date] Effective Threat Protection Strategies.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Proactive Incident Response
Protect your Digital Enterprise
SIEM Rotem Mesika System security engineering
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
CISOs Guide To Communicating WNCRY.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Ransomware 12:00 Juwan harris.
Ilija Jovičić Sophos Consultant.
Firmware threat Dhaval Chauhan MIS 534.
Machine Learning for Computer Security
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Network Security Fundamentals
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Ransomware & Security for Virtualization
Active Cyber Security, OnDemand
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Security in the Workplace: Information Assurance
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Business Risks of Insecure Networks
Dr Paul Lewis Chief Technology Officer
Teaching Computing to GCSE

Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Call AVG Antivirus Support | Fix Your PC
Risks & Reality Cyber Security Risks & Reality
4 ways to stay safe online 1. Avoid viruses and phishing scams
Security Operations Without Going Blind
Threat Landscape for Data Security
Security Operations Without Going Blind
Cyber Security 2017 Trends and Start Ups.
Cyber Defense Matrix Cyber Defense Matrix
Check Point Connectra NGX R60
David J. Carter, CISO Commonwealth Office of Technology
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Ransomware in Web Apps OWASP Singapore.
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Enhanced alerting and collaborative incident management
Integrating Deep Learning with Cyber Forensics
CIPSEC Framework components: XL-SIEM
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
(With Hybrid Network Support)
Incident response and intrusion detection
BACHELOR’S THESIS DEFENSE
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Computer Security By: Muhammed Anwar.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
6. Application Software Security
Per Söderqvist Per Söderqvist Sales Engineer
Cybersecurity Simplified: Ransomware
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Deployment Optimization of IoT Devices through Attack Graph Analysis
IoT in Healthcare: Life or Death
Cleaning Up the Internet of Evil Things
Presentation transcript:

Ali Dehghantanha; www.AliD.info; ALID@ALID.info Myths and Truths: Cyber Threat Hunting and Intelligence in IoT Environments Ali Dehghantanha; www.AliD.info; ALID@ALID.info

Who am I? Nobody important, nobody special! MC IIF and Dr. of SiC! A classical career track (software developer, security analyst, forensics investigator, higher education, next?) Blog: www.alid.info Twitter: @alidehghantanha Email: AliD@AliD.info Goal: just to enjoy having a conversation!

What We Do? Applied research in collaboration with EU-wide LEAs and SMEs in cyber security, forensics and malware analysis. Some of our recent projects : Automated detection of Crypto Ransomware in Android mobile devices based on energy consumption footprints Machine learning aided Android malware analysis Automated detection of compromised ATM machines based on their encrypted network communication An anomaly-based intrusion detection and threat hunting in IoT backbone networks

The Sliding Scale of Cyber Security Image Source: Rob M Lee, Dragos Security

Where to Invest?!

IoCs, IoAs are NOT not Snort Rules! Use IoCs to scope and hunt with IoAs but NOT for detection! And throw them away after their short life time! Do NOT treat your IoAs/IoCs as Snort rules! CTI is very valuable BUT nothing costs more than bad intel driving your processes! The future of industry is in Cyber Threat Analytic – finding attackers pattern of activities Malicious patterns are always malicious regardless of tools or techniques!

IT Security View of IoT/ICS Security IoT/ICS environments are not having as many users and not so many changes/update – so should be easy to secure, right? Just do following: Deploy Anti Virus on your IoT/ICS network! Change default password and make more complex customized password Secure programming Patch IoT/ICS devices (i.e. through HMI or automatically)

AVs in ICS/IoT? Does your AV scans ICS folder path; ICS processes and ICS Registry path? I bet not or better not! The AV is not protecting ICS portion of your network!

IoT/ICS Secure Programming Myth! Unless you do it, you won’t know it! Unknown input format Unknown deployment context Unknown date of first deployment Should have no functionality flaw! So many recovery options!

IoT & Complex, Unique Password Which one is more risky: Your ICS operator can not remember the password and since the password is changed, the vendor can not remotely connect too! So you can not timely recover a faulty controller and restore the operation. Russian hackers found vendor password and remotely get access to your controller?

IoT/ICS Patching Curse! What are we actually patching?

IoT/ICS Patching Curse! 90% of ICS vulnerabilities do NOT increase organisational risk (see: Dale Peterson research in S4)! Remote access to HMI port and root privilege on PLC – so what?! The big question is can you jump to other places in the network (the remaining 10%)?

How Easy It Is to Attack IoT/ICS Image source: Webinar: End-to-End Cyber Security Strategies: Protecting Critical ICS Assets

(David Bianco- Mandiant) Pyramid of Pain! Pyramid of Pain (David Bianco- Mandiant)

AI & Cyber Threat Pattern Intelligence in IoT Image source: https://vpnservice.reviews/understanding-threat-intelligence-role-cyber-security/ IoT environments are having a huge number of nodes with very predictable (rarely changing) pattern of behaviour and (usually )the main purpose of compromise is pivoting to other nodes in the network (visible out of norm pattern!) An ideal environment for AI agents!

Case Study1: Detecting Ransomware Based on Abnormal Pattern of Activities

Case Study1: Detecting Ransomware Based on Abnormal Pattern of Activities TeslaCrypt Cerber Locky

Case Study1: Detecting Ransomware Based on Abnormal Pattern of Activities TeslaCrypt Cerber Locky

(unseen/new ransomware) Case Study1: Detecting Ransomware Based on Abnormal Pattern of Activities TPR FPR Accuracy Ransomware Detection Bagging (seen ransomware) 0.994 0.039 97.7% LSTM (unseen/new ransomware) 0.996 0.001 99.6% Family Detection RandomForest 0.983 0.006 98.3% (unseen ransomware) 0.972 0.027 97.8%

Case Study2: Detecting Ransomware on IoT Nodes based on Pattern of Power Consumption raspberry pi power usage pattern with a normal application raspberry pi power usage pattern when infected by a ransomware Accuracy KNN 83.70%

Regardless: We are looking for collaboration! Call for Arms Regardless: We are looking for collaboration!

And Still IoT Devices are at Risk Source: @bruces “At one point, the penetration into the [US] Chamber of Commerce was so complete that a Chamber thermostat was communicating with a computer in China. Another time, chamber employees were surprised to see one of their printers printing in Chinese.” 21 Dec 2011 – ABC News!

Thanks! Blog: www.alid.info Twitter: @alidehghantanha Email: AliD@AliD.info