Facebook Immune System

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Social media threats. Warning! May contain mild peril.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Company Founding Customer Wins Series B Investment Scaling The Business $$$ Silver Tail Systems - Key Milestones.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Norman SecureSurf Protect your users when surfing the Internet.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
Distributed Phishing Attacks Markus Jakobsson Joint work with Adam Young, LECG.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Using Windows Firewall and Windows Defender
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
Page  1 Social Media in Business Session 8 Agenda Guest Speaker: Cathy Reilly, Agros.org Facebook and LinkedIn Student Presentations Class Project: Create.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Hadoop in the Wild CMSC 491 Hadoop-Based Distributed Computing Spring 2016 Adam Shook.
Under the Shadow of sunshine
BUILD SECURE PRODUCTS AND SERVICES
A Virtual Tour of SophosLabs Building next-generation protection
Online Social Network: Threats &
Six Steps to Secure Access for Privileged Insiders and Vendors
TMG Client Protection 6NPS – Session 7.
Network Security Fundamentals
A lustrum of malware network communication: Evolution & insights
Connected Maintenance Solution
Configuring Windows Firewall with Advanced Security
Lecture 8. Cyber Security, Ethics and Trust
Connected Maintenance Solution
Six Steps to Secure Access for Privileged Insiders and Vendors
GlassFish in the Real World
A Network Science Approach to Fake News Detection on Social Media
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Dieudo Mulamba November 2017
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Faculty of Science IT Department By Raz Dara MA.
Paul Marinescu. , Chad Parry. , Marjori Pomarole
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Cybersecurity Simplified: Phishing
Presented by Shashank Shekhar Sahoo
Presentation transcript:

Facebook Immune System 人人安全中心 姚海阔

A realtime system to protect our users and the social graph Immune A realtime system to protect our users and the social graph Big data, Real time 25B checks per day 650K per second at peak Realtime checks and classifications on every read and write actions

Agenda 1 Threats 2 Adversarial Learning 3 System Design 4 Summary

Threats to the social graph can be tracked to three root causes. Protect the Graph Threats to the social graph can be tracked to three root causes. Compromised accounts return Fake accounts delete Creepers educate

Compromised Accounts Phishing Malware The trust is a target for manipulation IP and successive geo-distance Malware Target the propagation vector using user feedback require Turing tests*

Created by both scripts and raw labor Fake Accounts Created by both scripts and raw labor overcome rate limits boost the reputation or ranking Short lifetime Fake accounts have limited virality because they are not central nodes and lack trusted connections Comments and wall posts on pages

Unwanted friend requests Creepers Unwanted friend requests Beauty hunter Chain letters motivate users to take damaging actions on false pretenses create a global misinformation wall that hides critical or time-sensitive information

What the attackers have: Balance of Power What the attackers have: Labor. They have much more Distributed botnets, compromised webhosts, infected zombies Fake and compromised objects (events, apps, pages, groups, users, …) What we have: Data centers, content distribution networks User feedback -- spam reports, feed hides, friend rejects Knowledge of patterns and anomalies Shared secrets with users

Adversarial Adversarial learning The attacker works to hide patterns and subvert detection The system must respond fast and target the features that are most expensive for the attacker to change not to overfit on the superficial features that are easy for the attacker to change*

Circle The defender seeks to shorten Attack and Detect while lengthening Defense and Mutate

The defense and mutate phases Method The Attack phase better user feedback more effective unsupervised learning and anomaly detection. The Detect phase quickly building and deploying new features and models. The defense and mutate phases making it harder for the attacker to detect and adapt obscuring responses and subverting attack canaries*

Phishing Case

Graph and User Protection

Feature Extraction Language (FXL) Dynamic model loading Policy Engine Main components Classifier services SVM, Random Forest, Logistic Regression, Boosting Feature Extraction Language (FXL) Dynamically executed language for expressing features and rules Dynamic model loading Load online into classifier services, without service or tailer restart Policy Engine Express business logic, policy Trigger responses:blocking , authentication challenge, disabling an account. Feature Loops (Floops)

Sigma: High-level design

Feature Loops (an FXL feature provider) Inner Floop ( counters ), 10ms latency, Memcache The number of login failures per IP Number of users that cleared User Experience per IP Rate that app has published to Feed Middle Floop ( tailers ), 10s latency, Scribe HDFS The number of times a domain has been sent in a message Trigger recomputation of friend network coherence Outer Floop (Hive), 1d latency Unique users disabled from an IP over past 15d Number of users with given name per country and gender

Challenges Lack of a clean data layer. Opaque data definition Feature reliability Many channels, and they evolve Actionable detection Scaling to deeper classification at display-time

Summary Response. Features. Sharing. Response form and latency are really important Features. Make it easy to try out new features and models Sharing. Share feature data across channels