Cyber-Security: Some Thoughts

Slides:



Advertisements
Similar presentations
EXPERT SYSTEMS apply rules to solve a problem. –The system uses IF statements and user answers to questions in order to reason just like a human does.
Advertisements

Fifth Workshop on Link Analysis, Counterterrorism, and Security. or Antonio Badia David Skillicorn.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Intelligent Detection of Malicious Script Code CS194, Benson Luk Eyal Reuveni Kamron Farrokh Advisor: Adnan Darwiche.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Computer Science Prof. Bill Pugh Dept. of Computer Science.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
Chapter 3 Applications Software: Getting the Work Done.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Lecture 11 Intrusion Detection (cont)
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 17: Code Mining.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Last Words COSC Big Data (frameworks and environments to analyze big datasets) has become a hot topic; it is a mixture of data analysis, data mining,
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
TEA Science Workshop #3 October 1, 2012 Kim Lott Utah State University.
CS525: Special Topics in DBs Large-Scale Data Management Hadoop/MapReduce Computing Paradigm Spring 2013 WPI, Mohamed Eltabakh 1.
Chapter 1 Introduction to Data Mining
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Patterns and Reuse. Patterns Reuse of Analysis and Design.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Sensor Task Manager (STM) V.S. Subrahmanian University of Maryland Joint work with: F. Ozcan, IBM Almaden T.J. Rogers, University of Maryland.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
Web-Mining …searching for the knowledge on the Internet… Marko Grobelnik Institut Jožef Stefan.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
MURI Research on Computer Security V.S. Subrahmanian Lab for Computational Cultural Dynamics Computer Science Dept. & UMIACS University of Maryland
Surveillance is The First Step to Solving the Problem.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Hadoop/MapReduce Computing Paradigm 1 CS525: Special Topics in DBs Large-Scale Data Management Presented By Kelly Technologies
Security Mindset Lesson Introduction Why is cyber security important?
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Artificial Intelligence, simulation and modelling.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Chapter 1 Overview of Databases and Transaction Processing.
Zero Day Attacks Jason Kephart. Purpose The purpose of this presentation is to describe Zero-Day attacks, stress the danger they pose for computer security.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Machine Learning for Computer Security
Lesson Objectives Aims From the spec:
Ramesh Jain Events in Data Science Ramesh Jain
FORECASTING IN HOTELS STARTS WITH MAKING A BUDGET

CYB 110 Competitive Success/snaptutorial.com
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Data Analysis.
Chapter 1 Database Systems
Data Warehousing and Data Mining
Clouds & Containers: Case Studies for Big Data
GATES: A Grid-Based Middleware for Processing Distributed Data Streams
Integrating Deep Learning with Cyber Forensics
Chapter 1 Database Systems
Pei Lee, ICDE 2014, Chicago, IL, USA
Overview of Workflows: Why Use Them?
The Internet: Encryption & Public Keys
Big DATA.
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

Cyber-Security: Some Thoughts V.S. Subrahmanian Center for Digital International Government Computer Science Dept. & UMIACS University of Maryland vs@cs.umd.edu www.cs.umd.edu/~vs/ Parts of this talk reflect joint work with M. Albanese, S. Jajodia, C. Molinaro, A. Pugliese, N. Rullo, C. Thomas V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Disclaimers All work described in this talk only uses open-source data. All work in this talk is basic research tested wherever possible against real-world data. All work reported in this talk has been published in the scientific literature. V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Talk Outline Terminology Vulnerabilities Exploits Technology Monitoring networks for known attacks Monitoring networks for unknown attacks Social media (Sybil, sockpuppet) attacks V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Terminology Vulnerability: Feature of software that can be used by an attacker – usually in a way unanticipated by the software designer – to attack a system. US National Vulnerability Database (nvd.nist.gov) contains over 56K vulnerabilities together with suggested patches. Exploit – a piece of code that takes advantage of a vulnerability to carry out an attack. Databases of exploits also exist, e.g. some sites claim over 22K exploits in their database V.S. Subrahmanian, Geo-Intelligence India 2013

The Cyber Trade: The Scary Part “Exploits as a service” is now cheap and efficient for attackers [criminals, nation states] Exploits (or parts thereof) for different kinds of attacks can be bought for a very small price compared to the prices for artifacts used in kinetic attacks V.S. Subrahmanian, Geo-Intelligence India 2013

Activity Detection Engine OFFLINE ONLINE tMAGIC Activity Detection Engine Known Activities -Bad PASS Parallel Activity Search System Database Real-time Observation Data Network Resource use and more Unexplained Activity Detection Engine ALE Activity Learning Engine Parallel Unexplained Activity Detection Known Activities - Good Security Analyst Interface V.S. Subrahmanian, Geo-Intelligence India 2013

Attack Graphs Temporal Attack Graphs Attack Graphs C’s are conditions V’s are vulnerabilities C4 and C5 are both needed to exploit vulnerability V4. Vulnerability V4 causes condition C6. Temporal Attack Graphs Only worry about vulnerabilities. Figure on left says vulnerability V4 can be exploited if V3 and either V1 or V2 can be exploited. Probabilistic versions exist. Databases of vulnerabilities and attack graphs are available V.S. Subrahmanian, Geo-Intelligence India 2013

Attack Graphs Can be Merged Merging a large set of attack graphs means that you can solve a task once to search for multiple occurrences within a single stream of transactional data ! V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Attack Graphs Attack graphs can be built semi-automatically to monitor live network traffic. But two key problems need to be solved: How to monitor huge volumes of traffic ? How to identify unexpected activities that you did not know about in the past and add them to your activity knowledge base ? Activities are both bad (attacks) and good (innocuous). Need models of both good and bad activities in order to identify what is abnormal or unexplained. V.S. Subrahmanian, Geo-Intelligence India 2013

Finding Known Activities PASS Parallel Activity Search System Developed algorithm to identify all instances of a [known] activity in an observation stream that have at least a certain probability. Demonstrated the ability to automatically detect activities in a stream of observation data arriving at 500K+ observations per second on a 8-node cloud. Demonstrated the ability to identify unexplained behavior in observation streams with precision over 80% and recall over 70%. V.S. Subrahmanian, Geo-Intelligence India 2013

Unexplained Activities How can we look for activities that have never been anticipated? Answer Set up a framework to continuously track unexplained activities; Present unexplained activities quickly to a security analyst who Flags it as a bad activity or Flags it as an OK activity Update repertoire of known activity models with this security analyst feedback. What is an unexplained activity? It’s a sequence (not necessarily contiguous) of events that are inconsistent with all known activity models (good or bad) Unexplained does not necessarily mean bad. Also a lot of work on statistical anomaly detection [not in my lab]. V.S. Subrahmanian, Geo-Intelligence India 2013

Example Unexplained Activity V.S. Subrahmanian, Geo-Intelligence India 2013

Unexplained Activity Detection Totally unexplained Partially unexplained Tested using network traffic from a university. Wireshark used to capture network traffic; SNORT used for activity models. V.S. Subrahmanian, Geo-Intelligence India 2013

Unexplained Activity Detection Looking for more top-K increases runtime Increasing t reduces run-time Increasing sequence length reduces runtime Looking at more worlds increases runtime Tested using network traffic from a university. Wireshark used to capture network traffic; SNORT used for activity models. V.S. Subrahmanian, Geo-Intelligence India 2013

An Election Social Media Attack Protesters gather in a central square. Over 300 protesters arrested Protesters tweeted extensively with a small number of highly trending hashtags on Twitter. Social Media attack using over 25K Twitter accounts and over 400K tweets launched Protest is effectively shut down V.S. Subrahmanian, Geo-Intelligence India 2013

Election Social Media Attack B Intelligence preparation of the battlefield Well done A Situation Awareness & Surveillance of the battlefield C+ Power projection Effective in influencing the discussion but poorly done D Did not get in and out effectively Used poor proxies to carry out the attack Assets not reusable V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Social Media Attacks A major state-backed threat. SMAs cause a viral increase in the number of social media posts in support of a particular cause or position. SMAs can destabilize decision making by a country by providing a false picture of support for or against a given position. V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Other Relevant Work Algorithms to identify common patterns in huge networks (1B+ edges) Ability to update identified patterns in huge networks as the network changes (540M+ edges) Algorithms to find a set of K nodes that optimizes an arbitrary objective function on a network (31M+ edges) Algorithms to identify important nodes in attributed, weighted networks Learning to cluster malware variants V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Current Directions Learning Activity Models – given that there is some set of low level events that can be detected, can we learn the stochastic temporal automata directly from the data in a semi-supervised manner? Parallel Unexplained Activity Detection – can we scale up our current algorithms to identify unexplained activities in high throughput streams? V.S. Subrahmanian, Geo-Intelligence India 2013

V.S. Subrahmanian, Geo-Intelligence India 2013 Contact Information V.S. Subrahmanian Dept. of Computer Science & UMIACS University of Maryland College Park, MD 20742. Tel: 301-405-6724 Email: vs@cs.umd.edu Web: www.cs.umd.edu/~vs/ V.S. Subrahmanian, Geo-Intelligence India 2013