data driven assessment of cyber risk challenges in
play

Data Driven Assessment of Cyber Risk: Challenges in Assessing and - PowerPoint PPT Presentation

Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech Information Security Center Georgia Tech


  1. Data ‐ Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech Information Security Center Georgia Tech Information Security Center Georgia Tech Research Institute (I (In collaboration with the World Economic Forum) ll b ti ith th W ld E i F ) 1

  2. Talking About Cyber Risk Talking About Cyber Risk • Risk = Prob.[adverse event]*Impact[adverse event] t] • Attacks occur when threat sources exploit vulnerabilities • Mean ‐ time ‐ to ‐ compromise? Mean time to compromise? • Mean ‐ time ‐ to ‐ recover? (assuming detection) • Traditional dependability assumptions and T di i l d d bili i d solutions do not apply. 2

  3. Why Even Try It? Why Even Try It? • Current cyber risk is anecdote and perception based and we lack the ability to objectively assess the risk posed by ever evolving cyber l k h bili bj i l h i k d b l i b threats. • Current cyber security threat data is fragmented and collected Current cyber security threat data is fragmented and collected by disparate entities such as security vendors, vendors serving different sectors and academic research centers. • Publicly available cyber security data is often delayed and does not provide the ability to quickly respond to new threats that require coordinated effort within a short time. • A trusted data sharing and analysis platform that brings data from multiple sources and provides novel analysis will increase our ability to respond to emerging threats quickly and effectively. 3

  4. Approach Approach Explore partnerships to collect cyber risk relevant data from multiple sources and analyze it to create metrics that summarize current cyber security threats • Combine public and proprietary data sources on cyber threats such as software vulnerabilities, drive ‐ by downloads and malware from a variety of cyber security organizations. d l f i t f b it i ti • Provide threat analytics and visualization tools suitable for novice and advanced users and that can be customized based novice and advanced users, and that can be customized based on industry, technology platform, or geographic region 4

  5. Key Questions Key Questions • What data is relevant? Wh t d t i l t? – Vulnerabilities, alerts from IDS system, compromised or malicious services? or malicious services? • Where does the data come from? – Public proprietary from security vendors or Public, proprietary from security vendors or government or private entities? • What can we do with such data for better understanding of cyber risk? – Analysis, visualization, prediction? • What value does a cyber risk tool offer? – Actionable information?

  6. Current Data Sources Current Data Sources • Public data bli d – Vulnerabilities reported to NVD • Summarized proprietary data – Drive ‐ by ‐ download risk data from a major security Drive by download risk data from a major security vendor • Potentially malicious network traffic targeting Potentially malicious network traffic targeting an enterprise – IDS/IPS alert data captured from Georgia Tech IDS/IPS alert data captured from Georgia Tech networks

  7. Overall System Architecture Visualization and Predictive Analytics Dashboard & A tool to display cyber security metrics and analysis that is customized to a specific Decision Support Decision Support t technology profile, industry or region h l fil i d t i Database A t A structured and consolidated view of the public and proprietary cyber security data t d d lid t d i f th bli d i t b it d t Data Warehouse Data Extractors Software to interpret data sources and extract data to populate a common database Proprietary Research Centers (e.g., Georgia Threat intelligence from security organizations Tech Information Security Center) IDS data from security service providers IDS data from security service providers GTISC uses proprietary systems to New vulnerability data from software vendors Possible identify drive ‐ by downloads (malware) in Data Sources popular domains. GTISC collects 1 million Public malware samples every month and National vulnerabilities database (NVD) National vulnerabilities database (NVD), identifies command and control domains Secunia, Security Focus, and others setup by criminals to issue directives . Malware Vulnerabilities and Threat Intelligence Software used to disrupt operations, Software used to disrupt operations E Errors in commonly used software that can be i l d ft th t b Cyber Risk gather sensitive information, or gain used to compromise personal or corporate Relevant Data access to private computer systems. systems 7

  8. The Why and What Predictive Analysis Why we More Comprehensive Response Expected volume/severity of attacks on a day need Expected number of 0 day vulnerabilities on a day More malware samples and more C&C domains will provide for a more protected environment for everyone Coordinated Response Sharing of countermeasures / response to threats Threat Intelligence Emerging threat intelligence from security organizations Malware samples and C&C Domains Malware samples and C&C Domains What we Additional malware samples and C&C Alert Data domains from security service providers and need Intrusion Detection System Data from security security vendors to be shared within a service providers like IBM and Dell trusted group trusted group New Vulnerabilities New Vulnerability Data from software vendors GT Information Security Center Public Vulnerability Data What we GTISC collection of 1 million malware National vulnerabilities database (NVD), have samples every month, as well as command Secunia, Security Focus, and others , y , and control (C&C) domains and control (C&C) domains. Vulnerabilities Malware 8

  9. Challenge I – Access to Real ‐ world Threat Data Data Sources: Partnerships with various organizations to obtain cyber risk relevant data is critical for the success of the b b k l d l f h f h project Security Vendors Consumers of Software Client and Service Security Vendors Companies Providers Solutions & Govt. Microsoft Microsoft Agencies Dell Secureworks CERTs Oracle IBM ISS Banks SAP Symantec Symantec IDS data Vulnerabilities Vulnerabilities Typical profiles Malware samples Malware Countermeasures Security Needs C&C domain list C&C domain list samples samples IDS Data IDS Data C&C domain list Critical Critical Supporting Supporting partnerships partnerships 9

  10. Challenge II – Analytics Analytics : While combining data sets provides new opportunities, developing customized tools will depend on the data feeds available Behavior Fingerprints of Malware Drive ‐ by Download Risk Compromised websites infect p Rapidly changing malware p y g g • • user machines just because they means we must focus on visit execution behavior Serious threats for everyday Georgia Tech processes • • users about 100,000 samples each day each day G Georgia Tech can detect i h d • likelihood of such infections Malware families and • spread Wh t i M C b What is My Cyber Risk Today? Ri k T d ? Predictive Analytics P di ti A l ti Epidemiological analysis IT profile and security posture • • Value associated with target How far can an attack • – Observed malicious activity Observed malicious activity spread?How rapidly can it spread?How rapidly can it • • spread? Are certain sectors Mitigation options and ability • under higher risk? “What if” scenarios • How would these change with – a specific mitigation plan? 10

  11. Challenge III – Threat Visualization for A ti Actionable Information bl I f ti Visualization : Aggregating all the data feeds in a meaningful way to provide a cyber threat barometer is difficult. cyber threat barometer is difficult. Using Visualization for Navigating Large Amounts of Threat Data Data overload is a serious problem Data overload is a serious problem “Flower field” metaphor for presenting big picture Threatened assets can be easily identified Threatened assets can be easily identified for additional analysis From Big Picture to Deeper Insights An abnormal asset visualization points to increased risk increased risk Click on it can provide details of vulnerabilities, exploits and attack information Better situation awareness and response Better situation awareness and response strategy 11

  12. Example of System Provided Intelligence: Malware Source 12

  13. Vulnerability Disclosure Calendar Vulnerability Disclosure Calendar 13

  14. Vulnerability Data Visualization Vulnerability Data Visualization Demo

  15. Potential Benefits Potential Benefits • Data ‐ driven cyber risk assessment can enhance cyber resilience resilience – Modeling attacks: Will we ever have be MTTA and MTTR for cyber attacks? y – Predictive value: early attack warning & proactive response – Better intelligence about emerging threats and vulnerabilities – More effective human ‐ in ‐ the ‐ loop decision making with analytics and visualization • “CERT 2.0” – Real ‐ time access to threat information 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend