Modeling Cyberspace Operations

Slides:



Advertisements
Similar presentations
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Advertisements

Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Path Optimization in Computer Networks Roman Ciloci.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
HiVision SNMP Software.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Designing For Testability. Incorporate design features that facilitate testing Include features to: –Support test automation at all levels (unit, integration,
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Consistency in Reporting Data Breaches
Oracle Data Integrator Agents. 8-2 Understanding Agents.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Information Aids for Diagnosis Tasks Based on Operators’ Strategies 김 종 현.
Use of Soar for Modeling Cyber Operations 36 th Soar Workshop Ann Arbor, Michigan Denise Nicholson, Ph.D., Director of X Ryan O’Grady, Software Engineer.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Introduction to Machine Learning, its potential usage in network area,
Proactive Incident Response
SQL Database Management
SIEM Rotem Mesika System security engineering
Deployment Diagram.
Progress Apama Fundamentals
CompTIA Security+ Study Guide (SY0-401)
Port Knocking Benjamin DiYanni.
Deployment Diagram.
Parallel Autonomous Cyber Systems Monitoring and Protection
Course Outcomes of Object Oriented Modeling Design (17630,C604)
Object-Oriented Analysis and Design
Designing For Testability
Unified Modeling Language
NOX: Towards an Operating System for Networks
Steven Whitham Jeremy Woods
Introducing To Networking
Introduction to Networking
© 2002, Cisco Systems, Inc. All rights reserved.
Evaluating a Real-time Anomaly-based IDS
Oracle Solaris Zones Study Purpose Only
CompTIA Security+ Study Guide (SY0-401)
Backtracking Intrusions
AI in Cyber-security: Examples of Algorithms & Techniques
Data and Computer Communications by William Stallings Eighth Edition
Topic 5: Communication and the Internet
Foundations of Networking
Process-to-Process Delivery:
Soar Agents for Cyberspace 5/15/2018
Foundations of Networking
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Chapter 2: Operating-System Structures
Authors: Barry Smyth, Mark T. Keane, Padraig Cunningham
Chapter-1 Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions.
Type Topic in here! Created by Educational Technology Network
Chapter 2: Operating-System Structures
Yining ZHAO Computer Network Information Center,
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Modeling Cyberspace Operations 16 May 2018 Robert Bixler Fernando Maymi

Motivation Sophisticated threats Train humans to counteract them Build better automated defenses Soar is being used to create cyber cognitive (cycog) agents We model cyberspace operations using tactics, techniques, and procedures As threats become more sophisticated, countermeasures must become more sophisticated as well. One approach is to train humans to counteract them, and another is to build better automated systems. At SoarTech, we are using Soar to create cyber cognitive (or, cycog agents) that can aid in training humans by giving them a realistic adversary, but can also be used for real cyber operations So, how do we model cyberspace operations in a way that allows our Soar agent to both behave as a real threat for training purposes? We need to model operations in a way that facilitates both generating behaviors for humans to observe and reasoning about the current context of an ongoing operation by observing actions in the environment. We’ve chosen to adopt a commonly used model of threat behavior patterns of tactics, techniques, and procedures

Tactics, Techniques, and Procedures Tactic –employment and ordered arrangement of forces in relation to each other Technique – non-prescriptive way to perform missions, functions, or tasks Procedure – standard, detailed steps that prescribe how to perform specific tasks Here’s what this looks like from a high level. A cyberspace operation is composed of tactics, which is an ordered arrangement of resources (such as a computer, or list of email addresses) and tactics. Techniques are higher level tasks that are performed in order to accomplish an operation, such as “send email” or “create a fake malicious website”. Procedures are the standard, detailed steps that prescribe how to perform specific tasks. Examples would be “write email” and “send email”. Forensic artifacts are the evidence left behind by certain techniques. These would be what we are looking to generate in a training scenario, or to observe and build tactics, techniques, and procedures from in a defensive agent. The problem is that the current definitions are imprecise and the current model is not defined well enough for use by autonomous systems. It is not currently implemented in a manner that can be easily ingested into Soar. We need Soar agents that can reason about their current context, which requires the capability to ingest information from the environment and match it to expected behaviors, while also being able to take a given model of an operation and reproduce the observable artifacts associated with it. By modeling cyberspace operations as TTPs, we can accomplish this goal.

Cyber Kill Chain As another visualization of a cyberspace operation, here is the cyber kill chain. Certain techniques would fall under each of these steps. For example, sending a phishing email would be an example of the delivery.

Operation Model High level map of an operation with specific techniques

Operations Operation: a directed graph of tactics and objectives Operation to steal secret formula (objective) and tactics to get there Operation: a directed graph of tactics and objectives

Tactics Tactic: a directed graph of techniques and resources Specific tactic to send a phising email composed of techniques and resources

Techniques Specific example of the procedures in a send email technique Technique: a directed graph of procedures, some of them optional

Procedures Procedure: an algorithmic way to accomplish a task ID: p9 Name: Drop netids.dll Predecessors: p5, p6, p7 Preconditions: A process running with elevated privileges on a Windows host Network connectivity to the tool server Parameters: server_name – IP address or FQDN of tool server server_port – port number on tool server rem_file_name – name of file on tool server loc_directory – directory for local file Steps: Establish HTTPS connection to server_name on server_port Download rem_file_name and save it as netids.dll in loc_directory Execute netids.dll Post-conditions: netids.dll is executing with elevated privileges Standard, detailed step in specific task Fixed, ordered, complete sequences of primitive actions Procedures have a unique ID, stuff in table. Can be chained together. Represented as nodes in a DAG Procedure: an algorithmic way to accomplish a task

Primitive Action Primitive Action: atomic unit of process ip source ip dest time 192.168.5.122 224.0.0.251 11:01:06.037 192.168.1.101 67.212.184.66 11:01:06.082 192.168.5.123 64.12.90.98 11:01:06.831 11:01:07.239 64.12.90.66 11:01:07.567 11:01:07.870 205.188.59.19 11:01:08.145 Atomic unit, observable through forensic artifacts such as packets in pcap file May differ based on system CLI would have different actions than a GUI, for example. More examples – instruction set for particular architecture, commands associated with network protocol (get/post) Could be procedure in one system and action in another

Soar Implementation Techniques Procedures Tools Forensic Artifacts Techniques line up with Soar Goals. An abstraction layer allows the soar agent to perform procedures of that technique, and tools implemented in java (or any other language that can actually perform the action) perform actions that ultimately generate forensic artifacts. Techniques Procedures Tools Forensic Artifacts

Soar Implementation ML Classifier Human Analyst Tactics Techniques Reverse, detecting procedures and predicting future tactics based on observable artifacts Tactics Techniques Procedures Forensic Artifacts

Training Use Case Training – By following a given ATP model, we can develop agents that act in ways consistent with actual human activities to a high level of fidelity. This can be beneficial to train human and (eventually) cycog agents. A given Soar agent would have all the knowledge of possible actions to take (goals), and would choose among them based on a ttp model that we give it. A given operation would look like a set of preference weights for goals (or, techniques) It would then be let loose in a cyber range A human (or other cycog) agent would then try to counteract the attacker agent within the cyber range

Prediction Use Case We would first train an agent to detect procedures from observable actions, and load it with possible TTPs. An anomaly detection problem. This agent would then be deployed in a real system, and would monitor a network, looking for actions that may be procedures from threats. As it detects procedures, it would build a graph of techniques. It would match this graph against previously loaded known attack patterns, and would be able to predict future actions based on what it has observed. It would then display probabilities for predicted attack patterns to a human analyst.

Nuggets/Coal Nuggets Human explainable Flexible Less changes to Soar code as new attacks are learned Can generate new attack patterns Levels can be developed independently Reason with incomplete information Coal Large amount of procedures and tactics Anomaly detection is a difficult problem Still can’t detect all novel attack patterns What does this allow us to do? Can reason at different levels Flexible to changes in overall plan. Topological sorting of operation graph allows for the modeling of multiple different paths to completion Possible to detect techniques if actions are missing Once models for various actors are defined, can swap them in and out of a cognitive agent’s memory Hierarchical – detect actions with ML while using different techniques to reason about overall goal. A human can understand what is happening at a higher level when working with the cognitive agent.