A Bayesian Multi-armed Bandit Approa ci for Identifying Human - - PowerPoint PPT Presentation
A Bayesian Multi-armed Bandit Approa ci for Identifying Human - - PowerPoint PPT Presentation
A Bayesian Multi-armed Bandit Approa ci for Identifying Human Vulnerabilities Erik Miehling, Baicen Xiao, Radha Poovendran, and Tamer Ba ar October 31, 2018 GameSec 2018 Sea tu le, WA Social Engineering Atta cl s Social engineering a tu
2
Social Engineering Attacls
- Social engineering atuacks involve the persuasion of a user into unknowingly aiding the
atuacker, whether through divulging sensitive information or opening a backdoor to the system.
- Ukrainian power grid hacl of 2015 — backdoor opened via phishing emails
containing a malicious Word document (~250K people without power)
- Humans are ofuen the most vulnerable
component of the system
“Only amateurs attacl maciines; professionals target people” — Bruce Schneier
- Target breaci of 2013 — thefu of credentials via phishing emails from one of its
contractor companies (cc numbers of 40M customers; cost to Target: $148M)
- Many of the largest cyber breaches in recent history have started with an atuack on the
user:
3
Related Work — Social Engineering Attacls
- Dodge et al.1 — proposed an empirical testing strategy for evaluating “a user’s propensity
to respond to email phishing atuacks in an unannounced test”
1Dodge et al. 2007 - Phishing for user security awareness 2Cialdini 2009 - Influence: Science and practice
- Cialdini2 — studied how the principles of persuasion influence one’s behavior
3Kumaraguru et al. 2010 - Teaciing Johnny not to fall for fish
- Kumaraguru et al.3 — identified key challenges in educating users about social
engineering atuacks; developed training system
4Crossler et al. 2013 - Future directions for behavioral information security researci
- Crossler et al.4 — provides insight into important problems in security from a behavioral
information security perspective
4
General Approaci
- We propose a formal testing strategy, based on the theory of multi-armed bandits, for
identifying users in an organization who are most likely to respond to fall victim to social engineering atuacks
- Tie strategy involves sending fake malicious messages to users in a sequence of
unannounced tests
- Based on their responses, the system administrator constructs estimates that guide future
user queries with the end goal of identifying the high-risk users
- Note: we are only concerned with identifying the users efficiently, we do not address the
problem of how this information can be used to secure the system
5
Multi-armed Bandits1
- Models the conflicting objectives of exploration and exploitation
- Reward distributions are unknown; the decision maker wants to pull arms in order to
maximize the cumulative reward
- Pure exploration2: only concerned with ensuring that some terminal estimate is as
accurate as possible (e.g. accurately identifying the top arm given a finite budget of pulls)
2Bubeck 2009 - Pure exploration in multi-armed bandit problems 1Robbins 1952 - Some aspects of the sequential design of experiments
6
Tie Testing Environment
system administrator
testing strategy response model users responses query feedback 1
7
Tie Response Model
- We model the diversity in responses by considering a set of message types
(atuack features; different atuack classes: email, voice, etc.)
- Each user responds to
each test message according to a Bernoulli distribution with an unknown mean
users message types
- We assume a beta prior for the unknown means
non-response counts posterior response counts prior Bernoulli trials
exactly b users queried per trial no user should be queried more than once per trial maps es7mates to iden7fica7on set maps es7mates to query set
- A testing strategy is a collection of functions
8
Tie Testing Strategy
- Tie system administrator is constrained in its query selection
- Given n testing trials, the system administrator aims to identify the high-risk users, that
is, for every
9
Tie Testing Strategy
Lemma: where and is the normalized incomplete beta function.
- Tie high-risk users can be recovered from the optimal identification set via
- We wish to find the identification set that maximizes the following
10
An Optimal Testing Strategy — MDP
query set
- Tie system administrator’s objective is
iden7fica7on set
- Dynamics of the MDP are dictated by the responses received from the users
- Define state as , where
: counts of responses : counts of non-responses
state update func7ons transi7on probability
where
11
An Optimal Testing Strategy — MDP
- Issue: Must compute for every possible combination of user responses; leads to an
intractable problem
12
- We propose a heuristic algorithm based on the top-two Tiompson sampling algorithm of
Russo1
A Heuristic Testing Strategy
1Russo 2016 - Simple Bayesian algorithms for best arm identification
function EstimateThresholdSet(Q, P, α0, β0, n, τ) f0(θmk) = Beta(αmk,0, βmk,0), (m, k) 2 P for t = 0, . . . , n 1 do P SampleSecondarySet(ft, P, τ) Q 2 O(Q, P) xmk,t ⇠ ft(θmk), (m, k) 2 Q αmk,t+1 αmk,t +
Q
(m, k)xmk,t, (m, k) 2 P βmk,t+1 βmk,t +
Q
(m, k)(1 xmk,t), (m, k) 2 P ft+1(θmk) Beta(αmk,t+1, βmk,t+1) end for ϑmk ⇠ fn(θmk) return argmax
P✓P
J(ϑ, P; τ) end function function SampleSecondarySet( f, P, τ) Pτ SampleSet( f, P, τ) P0
τ Pτ
while Pτ 4 P0
τ = ∅ do
P0
τ SampleSet( f, P, τ)
end while return Pτ 4 P0
τ
end function function SampleSet( f, P, τ) for (m, k) 2 P do ϑmk ⇠ f(θmk) end for return argmax
P✓P
J(ϑ, P; τ) end function
13
Sample posteriors Compare with threshold Resample
posteriors at tes7ng trial t
Qvery users
A Heuristic Testing Strategy
14
Experiments
… … …
underes7ma7on error
- veres7ma7on error
15
100 200 300 400 500 600 0.2 0.4 0.6 0.8 1
Experiment 1
100 200 300 400 500 600 0.2 0.4 0.6 0.8 1
Experiment 2
Experiments
users message type 0.107 0.227 0.268 0.196 0.459 0.439 0.158 0.145 1 2 3 4 1 2 users message type 1 2 3 4 1 0.139 0.224 0.236 0.319 0.330 0.298 0.230 0.222 2
16
- Tie performance gain over uniform sampling increases as the problem dimension grows
Experiments
100 200 300 400 500 600 0.2 0.4 0.6 0.8 1
Experiment 3
400 600 800 1000 0.2 0.4 0.6 0.8 1
Experiment 4
17
In Summary
- Social engineering atuacks underpin many of the most damaging modern-day security
breaches
- As robustness to atuacks on the system increases, humans will increasingly become a
target → the human element to security deserves more research atuention
- We’ve proposed an initial model for formally describing how to identify vulnerable users
18
Future Directions Tiank you!
- Performance guarantee for the approximate testing strategy (e.g. bound on probability of
error)
- Closed-form solution of MDP by leveraging properties1 of the incomplete beta function
- Model modifications:
- Feature extraction for social engineering atuacks (perhaps user dependent?)
- Qvery response delay
- Response correlation (across message types; across users)
- Contextual effects (user location, browsing behavior, etc.)
- Construction of a database of social engineering atuacks
- Deployment of testing strategy in a real test environment
1Karp 2016 - Normalized incomplete beta function: Log-concavity in parameters and other properties