Non-intrusive Capturing and Analysis of the Cognitive Process of Network Security Analyst Annual Review ARO MURI on Computer-aided Human-centric Cyber.

Slides:



Advertisements
Similar presentations
Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Advertisements

The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Project Proposal.
Thinking ‘Behind’ the Steps Engaging Students in Thinking ‘Behind’ the Steps.
Leveraging “Visualization Functions” in Collaborative Visual Analytics Chen Zhong, Mingyi Zhao, Gaoyao Xiao, Jun Xu PhD students College of Information.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
1 ETR 520 Introduction to Educational Research Dr. M C. Smith.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Sensemaking and Ground Truth Ontology Development Chinua Umoja William M. Pottenger Jason Perry Christopher Janneck.
Lecture 13 Revision IMS Systems Analysis and Design.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Lecture Nine Database Planning, Design, and Administration
Database System Development Lifecycle Transparencies
Introduction to Systems Analysis and Design
SYSTEMS ANALYSIS. Chapter Five Systems Analysis Define systems analysis Describe the preliminary investigation, problem analysis, requirements analysis,
Annual SERC Research Review - Student Presentation, October 5-6, Extending Model Based System Engineering to Utilize 3D Virtual Environments Peter.
Framework for K-12 Science Education
Topological Vulnerability Analysis
Chapter 2: Approaches to System Development
Database Planning, Design, and Administration Transparencies
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, Lions Center Pennsylvania State University ARO Cyber Situation.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.
Business Analysis and Essential Competencies
1/27 Ensemble Visualization for Cyber Situation Awareness of Network Security Data Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North.
ARO–MURI Thoughts on Visualization for Cyber Situation Awareness MURI Meeting July 8–9, 2015 Christopher G. Healey Lihua Hao Steve E. Hutchinson CS Department,
Visualizations to Support Interactive Goal Model Analysis Jennifer Horkoff 1 Eric Yu 2 Department of Computer Science 1 Faculty of Information 2
11 C H A P T E R Artificial Intelligence and Expert Systems.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Designing the User Interface: Strategies for Effective Human-Computer.
U.S. Department of the Interior U.S. Geological Survey CDI Webinar Sept. 5, 2012 Kevin T. Gallagher and Linda C. Gundersen September 5, 2012 CDI Science.
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
Module 4: Systems Development Chapter 12: (IS) Project Management.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
1 NEST New and emerging science and technology EUROPEAN COMMISSION - 6th Framework programme : Anticipating Scientific and Technological Needs.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
Interviewing and Deception Detection Techniques for Rapid Screening and Credibility Assessment Dr. Jay F. Nunamaker, Jr. Dr. Judee K. Burgoon.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Database System Development Lifecycle 1.  Main components of the Infn System  What is Database System Development Life Cycle (DSDLC)  Phases of the.
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
Content The system development life cycle
Gaining Cyber Situation Awareness in Enterprise Networks: A Systems Approach Peng Liu, Xiaoyan Sun, Jun Dai Penn State University ARO Cyber Situation Awareness.
Systems Analysis and Design in a Changing World, Fourth Edition
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
Theme 2: Data & Models One of the central processes of science is the interplay between models and data Data informs model generation and selection Models.
Work Package 6 L2C Kick-off meeting Fontainebleau, March 7th 2006.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.
1 MURI: Computer-aided Human Centric Cyber Situation Awareness Peng Liu Professor & Director, The LIONS Center Pennsylvania State University ARO Cyber.
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Using Bayesian Networks to Predict Plankton Production from Satellite Data By: Rob Curtis, Richard Fenn, Damon Oberholster Supervisors: Anet Potgieter,
Research Word has a broad spectrum of meanings –“Research this topic on ….” –“Years of research has produced a new ….”
Wagner Associates NCSD-ADS-DOC ARO Workshop on Cyber Situation Awareness RPD-inspired Hypothesis Reasoning for Cyber Situation Awareness.
Atos, Atos and fish symbol, Atos Origin and fish symbol, Atos Consulting, and the fish symbol itself are registered trademarks of Atos Origin SA. June.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Projects, Events and Training
Penn State Center for e-Design Site Vision and Capabilities
Research Task / Overview Overview1 Goals & Objectives
Center of Excellence in Cyber Security
Topological Vulnerability Analysis
Multi-Step Attack Defense Operating Point Estimation via Bayesian Modeling under Parameter Uncertainty Peng Liu, Jun Dai, Xiaoyan Sun, Robert Cole Penn.
Shifting from “Incident” to “Continuous” Response
Data Warehousing and Data Mining
Digital Artifacts and the Need for Portability
CHAPTER 7: Information Visualization
Presentation transcript:

Non-intrusive Capturing and Analysis of the Cognitive Process of Network Security Analyst Annual Review ARO MURI on Computer-aided Human-centric Cyber SA November 18, 2014 Pennsylvania State University John Yen Chen Zhong Gaoyao Xiao Peng Liu Army Research Laboratory Robert Erbacher Steve Hutchinson Renee Etoty Hasan Cam Christopher Garneau William Glodek

Objectives: Understand the cognitive process of cyber analysts Non-intrusive capture of the cognitive process of cyber analysts Automated analysis of the cognitive traces Design training procedure based on an improved understanding about the cognitive process Design cognitive aids based on improved understanding about the cognitive process of analysts. Scientific/Technical Approach Developed a general framework for capturing cognitive traces based on Action-Observation-Hypothesis (AOH) model. Extended Analytical Reasoning Support Tool for Cyber Analysis (ARSCA) to integrate with incident reports. Designed experiments for studying the potential benefits of linking incident reports to relevant cognitive traces. Introduced a novel Network Representation of filtering activities for extracting data triage behaviors of analysts. Developed an algorithm for automating the construction of Filtering Networks from cognitive traces. Accomplishments Conducted additional experiments, in collaboration with Army Research Lab, involving CNDSP analysts Initial trace analysis suggest relationship between characteristics of traces and performance Initial analysis of filtering networks indicate different data triage strategies among analysts. Opportunities Opportunities Technology Transition: Support shift transition among analysts Technology Transition: ARSCA-based training procedure Investigate the difference strategies between experts and novice Investigate using aggregated analyst experiences to support analytical reasoning process. Computer-Aided Human Centric Cyber Situation Awareness J. Yen, C. Zhong, G. Xiao, P. Liu, R. Erbacher, S. Hutchinson, R. Etoty, H. Cam, C. Garneau, W. Glodek R. Erbacher, S. Hutchinson, R. Etoty, H. Cam, C. Garneau, W. Glodek

System Analysts Computer network Software Sensors, probes Hyper Sentry Cruiser Multi-Sensory Human Computer Interaction Enterprise Model Activity Logs IDS reports Vulnerabilities Cognitive Models & Decision Aids Instance Based Learning Models Simulation Measures of SA & Shared SA Data Conditioning Association & Correlation Automated Reasoning Tools R-CAST Plan-based narratives Graphical models Uncertainty analysis Information Aggregation & Fusion Transaction Graph methods Damage assessment Computer network Real World Test- bed 3

4 Year 5 Accomplishments at a Glance Publications: C. Zhong, D. S. Kirubakaran, J. Yen, P. Liu, S. Hutchinson, H. Cam, “How to Use Experience in Cyber Analysis: An Analytical Reasoning Support System,” in Proc IEEE Conference on ISI, C. Zhong, M. Zhao, G. Xiao, J. Xu, “Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics,” in Proceedings of IEEE VAST Challenge 2013 Workshop of IEEE 2013 Visualization Conference. C. Zhong, D. Samuel, J. Yen, P. Liu, R. Erbacher, S. Hutchinson, R. Etoty, H. Cam, and W. Glodek, “RankAOH: Context-driven Similarity-based Retrieval of Experiences in Cyber Analysis,” to appear in Proceedings of IEEE CogSIMA Conference, Yen, R. Erbacher, C. Zhong, and P. Liu, “Cognitive Process”, in Cyber Situation Awareness, A. Kott, C. Wang, R. Erbacher (ed), in press. Tools: ARSCA Technology Transfer: Deep collaborations with ARL researchers Brought the ARSCA toolkit to Adelphi site 20 ARL security analysts participated Weekly teleconferences Joint work on a series of papers Shift Transition ARSCA-based Training Procedure Integration of ARSCA and CAULDRON through Petri Nets Awards: Chen Zhong: Grace Hopper Celebration of Women in Computing Scholarship. Chen Zhong, Honorable Mention, VAST Challenge 2013, Mini-Challenge 3 (Visual Analytic for Cyber SA) Students: Chen Zhong, PhD Gaoyao Xiao, PhD

Cyber SA Depends on Human Analysts Network Attacks Data Sources (feeds) Depicted Situation Ground Truth (estimates) Compare Job Performance 5

Scientific Objectives (MURI Overview Liu) 6 Develop a deep understanding on: 1.Why the job performance between expert and rookie analysts is so different? How to bridge the job performance gap? 2.Why many tools cannot effectively improve job performance? 3.What models, tools and analytics are needed to effectively boost job performance? Develop a new paradigm of cyber SA system design, implementation, and evaluation.

Scientific Barriers (MURI Overview, Liu) 7 A.Massive amounts of sensed info vs. poorly used by analysts B.Silicon-speed info sensing vs. neuron-speed human cognition C.Stovepiped sensing vs. the need for "big picture awareness" D.Knowledge of “us” E.Lack of ground-truth vs. the need for scientifically sound models F.Unknown adversary intent vs. publicly-known vulnerability categories

Potential Scientific Advances (MURI Overview Liu) 8 Understand the nature of human analysts’ cyber SA cognition and decision making. Let this nature inspire innovative designs of SA systems. Break both vertical stovepipes (between compartments) and horizontal stovepipes (between abstraction layers). “Stitched together” awareness enables advanced mission assurance analytics (e.g., asset map, damage, impact, mitigation, recovery). Discover blind spot situation knowledge. Make adversary intent an inherent part of SA analytics.

Breaking Down Stovepipes across Different Cognitive Tasks by Analysts

Scientific Principles (MURI Overview, Liu) 10 Cybersecurity research shows a new trend: moving from qualitative to quantitative science; from data-insufficient science to data-abundant science. The availability of sea of sensed information opens up fascinating opportunities to understand both mission and adversary activity through modeling and analytics. This will require creative mission- aware analysis of heterogeneous data with cross-compartment and cross-abstraction-layer dependencies in the presence of significant uncertainty and untrustworthiness. SA tools should incorporate human cognition and decision making characteristics at the design phase.

Cognitive Trace Computer and Information Science of Cyber SA Cognitive Science of Cyber SA Decision Making and Learning Science of Cyber SA Q1: What are the differences between expert analysts and rookies? Q2: What analytics and tools are needed to effectively boost job performance? Q3: How to develop the better tools? 11 Previous CTAs of Network Security Analysts Sense Making Theory Network Analysis, Temporal Causality, Argumentation Systems

Technical Approach (MURI Overview, Liu) 12 Draw inspirations from cognitive task analysis, simulations, modeling of analysts’ decision making, and human subject research findings. Use these inspirations to develop a new paradigm of computer-aided cyber SA Develop new analytics and better tools Let tools and analysts work in concert “Green the desert” between the sensor side and the human side Develop an end-to-end, holistic solution: In contrast, prior work treated the three vertices of the “triangle” as disjoint research areas

A New Paradigm: A Non-intrusive Capturing of the Cognitive Process of Analysts Inspired by the challenges of previous CTA’s – CTA’s are costly – Difficult to obtain the fine-grained cognitive processes of analysts Informed by Sense Making Theory – Provides domain-agonistic constructs: Actions, Observations, Hypotheses (AOH) Non-intrusive capture of AOH-based cognitive traces of analysts.

AOH-based Cognitive Trace

A Framework for Capturing AOH-based Cognitive Trace

The Architecture of Cognitive Trace Capture Tool (ARSCA)

The Interface of ARSCA

The Network Topology of VAST 2012

The AOH Objects and Their Relationships in An Analyst’s Cognitive Trace

An Example of Trace File Action Hypothesis Observations

Characteristics of Cognitive Traces

The Completion Time and the Number of A-O-H Objects Grouped by Performance Scores

Types and Numbers of Operations Across Ten Analysts

Width and Depth of Hypothesis Trees 24

Number of Operations vs Performance

The proposed cyber SA framework (MURI Overview, Liu)  The life-cycle side  Shows the SA tasks in each stage of cyber SA  Vision pushes us to “think out-of-the-box” in performing these tasks  The computer-aided cognition side  Build the right cognition models  Build cognition-friendly SA tools  A link of the two sides is the analysis of cognitive trace  Traces are collected from stages in the life-cycle side  Analysis results can be used to build computer-aided cognition models/supports. It is a ‘coin’ with two sides: 26

Principles of Cognitive Trace Analysis Scalability for Big Data: Enables efficient analysis of a large number of cognitive traces. Domain-agonistic analysis methodology: Aim to extract patterns of analyst behaviors that have broad applicability. – Data Triage Behaviors Leverages qualitative observations from traces and quantitative network analysis methods.

Three Filtering Activities Captured in Trace Filter for certain condition on a data source Select a set of observations with certain common conditions Search for certain condition on a data source

Filtering for a Condition (FILTER) FILTER FILTER( Select * from Task2IDS where DestPort!= '80', Task2IDS )

Selecting Observations with a Common Condition (SELECT+LINK) SELECT+LINK is a type of Filtering SELECT ( FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ), FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ), FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ) ) LINK ( Same Dest Port: 21, FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ) FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ) FIREWALL-[4/5/ :19:00 PM]-[Deny]-[TCP]( , ) )

Search for a Condition SEARCH is a type of Filtering SEARCH( Firewall_Logs, )

Definition of Filtering Activities F(d, c, t) is a filtering activity, where d is a data source, c is a filtering condition, and t is the time. Simple conditions: R(field, value), where R is a logic operator (>, >=, ), field is defined in data source. Complex Condition: a set of simple conditions combined by AND and OR.

Complementary Relationship Between Filters Alerts The results of the two filters have no overlap. F1: Filter for DestPort = 80 F2: Filter for DestPort <> 80

Subsumption Relationship Between Filters Alerts F3 is-subsumed-by F2: The filtering result of F3 is always a subset of the filtering result of F2. F2: Filter Alerts for DestPort <> 80 F3: Filter Alerts for DestPort < 80 AND DestPort = 6667

Corresponding Relationship Between Filters Alerts F1: Filter Alerts for DestPort = 6667 F2: Filter Firewall Logs for DestPort = 6667 Firewall Logs F1 corresponds-to F2: The filtering conditions for F1 and F2 are equivalent, though applying to different data sources.

Computing Relationships Between Filtering Activities Convert each filtering activities into a standard form (F1, I11, I12, …) AND (F2, I21, I22, …) … Where F1, F2 are fields of a data source I11, I12, … are intervals for F1 I21, I22, … are intervals for F2 Comparing two filtering activity by – Comparing intervals associated with the same field.

Nodes (Filtering) Ordered by time around the circle. Edges (Relationship from a filtering to its preceding activities) Orange: Complementary Red: Equal to Blue: Subsumed by Green: Corresponding to The Filtering Network of An Analyst

Filtering Network of Another Analysts Both analysts have high performance score. Their filtering networks reveal different data triage strategies.

Technology Transfer (1) 39 Partner: Contact: Focus: Status: ARL Rob Erbacher, Bill Glodek, Steve Hutchinson, Hasan Cam, Renee Etoty, Chris Garneau Collect the cognitive traces of CNDSP analysts -- Over two years -- Over 30 traces collected -- ARSCA tool is being used at ARL -- Weekly teleconferences -- In discussion: directly operate on ARL datasets

Technology Transfer (2) 40 Partner: Contact: Focus: Status: ARL Rob Erbacher, Bill Glodek, Steve Hutchinson Shift transitions -- A user study on shift transition fully designed -- IRB developed and approved -- ARSCA-shift-transition tool developed -- Shipped to ARL site and tested there -- Pilot study is being scheduled

Leveraging the Trace of Analysts for Supporting Shift Transitions An analysts in one shift may generate an incident report that needs to be further investigated (due to a lack of observations or a lack of time). These incident reports (labeled Category 8) need to be completed by analysts of the next shift. An analyst in one shift may detect and report an attack. The analyst in the second shift may detect and report another attack, which can be linked to the attack detected by the previous shift (for a multi-step attack). An analyst in one shift may detect and report a malware. The analyst in the second shift can detect the malware faster. by leveraging the trace of the analyst of the previous shift.

Incident Reports Linked to Relevant Hypotheses and Observations

FY 2015 Plan 43 Analyze the filtering networks of all traces gathered Technology transition, in collaboration with ARL, a shift- transition study Does the traces generated by analysts of a shift help analysts in the next shift? Technology transition, in collaboration with ARL, a pilot study about ARSCA-based training procedure (with Erbacher, Hutchinson, Gonzalez) Technology transition, in collaboration with ARL, an integration of ARSCA and CAULDRON (with Jajodia, Albanese, Cam) through Petri Nets.

Technology Transfer (3) 44 Partner: Contact: Focus: Status: ARL Hasan Cam Enhance the ARL petri-net model for impact assessment -- feed outputs of CAULDRON and ARSCA into petri-net -- Proposal developed and approved -- Just started (Nov 2014) -- First experiment sketched

Technology Transfer (4) 45 Partner: Contact: Focus: Status: ARL Rob Erbacher, Christopher Garneau (a) Investigate how the current practice of training professional CNDSP security analysts can be enhanced by leveraging ARSCA. (b) A pilot study for investigating the feasibility of using ARSCA-facilitated training procedures for supporting the training of analysts about their analytical reasoning process. -- Proposal developed and approved -- Just started (Nov 2014) -- Weekly teleconferences

Technology Transfer (5) 46 Partner: Contact: Focus: Status: ARL Christopher Garneau, Rob Erbacher Human subject experiments on the cognitive effects of different (visualization) views -- IRB developed and approved -- User study fully designed -- Pilot study being scheduled at Penn State

47 Q & A Thank you.