detecting nation state cyberattacks with classified
play

Detecting Nation State Cyberattacks with Classified Threat Sensors - PowerPoint PPT Presentation

Detecting Nation State Cyberattacks with Classified Threat Sensors Dr. Steve Weis, Dr. Aloni Cohen, Dr. Amina Asim Dr. Stephen Weis Dr. Aloni Cohen Dr. Amina Asim Private companies must defend against foreign nations without access to


  1. Detecting Nation State Cyberattacks with Classified Threat Sensors Dr. Steve Weis, Dr. Aloni Cohen, Dr. Amina Asim

  2. Dr. Stephen Weis Dr. Aloni Cohen Dr. Amina Asim

  3. Private companies must defend against foreign nations without access to classified threat intelligence.

  4. The Information Sharing Challenge Private Company Network Security Logs Private Computer πŸ™ƒ ☠ Threat ☠ Cyber Detection Attacker Private Indicator of 
 πŸ™ƒ Logs Compromise …

  5. The Information Sharing Challenge Private Company Network Security Logs Private Computer πŸ™ƒ Classified ❓ ☠ Threat ☠ Cyber Intelligence 
 Detection Attacker Private Indicator of 
 ☠ = πŸ‘ πŸ™ƒ Logs Compromise … Can private industry apply classified intelligence without leaking it?

  6. What if a classified threat sensor could apply classified intelligence to private company data?

  7. Classified Threat Sensors Private Company Network Security Logs Private Computer πŸ™ƒ Classified Classifed ☠ ☠ πŸ”“ ☠ Cyber Intelligence 
 Threat Attacker Encrypted Private Indicator of 
 ☠ = πŸ‘ πŸ™ƒ Sensor Intelligence Logs Compromise …

  8. CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment

  9. Secure enclaves are safe spaces to run your own software on someone else’s computer.

  10. Starting a Classified Threat Sensor Classified Unclassified Private Computer Verification Classified Intelligence Secure Service Enclave Private Data Open Source Code

  11. Searching for Threats in Private Data Classified Unclassified Private Computer Verification 1. Verify enclave is authentic Classified Intelligence Secure Service Enclave Private Data 2. Encrypt 3. Encrypted Intelligence Encryption 4. Search Service 5. Encrypted β€œHit or Miss”

  12. Responding to Detected Threats Classified Unclassified Private Computer Verification 1. Verify enclave is authentic Classified Intelligence Secure Service Enclave Private Data 2. Encrypt 3. Encrypted Intelligence Encryption 4. Search Service 5. Encrypted β€œHit” 6. β€œHit” Employee Analyst 7. β€œYou have a problem…”

  13. CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment Private Company Network Security Logs Private Computer πŸ™ƒ Secure Classified ☠ Enclave ☠ πŸ”“ ☠ Cyber Intelligence 
 πŸ”’ 
 Attacker Encrypted Private Indicator of 
 ☠ = πŸ‘ πŸ™ƒ ☠ ? Intelligence Logs Compromise …

  14. Five Phase Plan Phase 1 Open Source Proof of Concept Phase 2 Industry-to-Industry Trial Deployment Phase 3 Government-to-Government Trial Deployment Phase 4 Government-to-Industry Unclassified Sharing Phase 5 Government-to-Industry Classified Sharing

  15. Call for Funding β€’ Call for $150,000 grant to develop a classified threat sensor. β€’ Funding will cover 2 student developers for 1 semester plus a part time PI. β€’ Working prototype should be delivered in 6 months. β€’ All software will be available under open source license .

  16. Thanks to Generous Supporters

  17. CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment For more information, please visit: 
 https://saweis.net/canaree

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend