Empirical Studies in Cybersecurity: Some Challenges
Michel Cukier
Empirical Studies in Cybersecurity: Some Challenges Michel Cukier - - PowerPoint PPT Presentation
Empirical Studies in Cybersecurity: Some Challenges Michel Cukier Adding Science to Cybersecurity Empirical studies are needed to add science to cybersecurity Challenges: Security metrics are lacking Security data are not
Michel Cukier
Request flow: 2009-07-30 09:34:56.321 TCP 10.0.0.1:2455 → 10.1.2.3:80 Reply flow: 2009-07-30 09:34:56.322 TCP 10.1.2.3:80 → 10.0.0.1:2455
Host 1 Host 2
Bi-flow: 2009-07-30 09:34:56.321 TCP 10.0.0.1:2455 → 10.1.2.3:80
10.1.2.3
hosts tcp/80
10.0.0.1
to tcp/80
Heuristic 0 Timestamp of request < Timestamp of reply [0, …] Heuristic 1 Src port > Dst port {0, 0.5, 1} Heuristic 2 Src port > 1024 > Dst port {0, 0.5, 1} Heuristic 3 Port in /etc/services {0, 0.5, 1} Heuristic 4 # ports related [0, …] Heuristic 5 # IP related [0, …] Heuristic 6 # tuples related [0, …] Heuristic ID Features and Formula Used Output Values
Based on IP Address Based on AS Number
59% 21% 95% 79% 95% 46% 49% 77% 15% 56% 0% 20% 40% 60% 80% 100% 1 2 3 4 5 6 7 8 9 10
Criterion ID Percentage of attackers
50% 33% 17% 0% 10% 20% 30% 40% 50% 60% 1 2 3 4 5 6 7 8 9
4% 4% 13% 39% 13% 22% 4% 0% 10% 20% 30% 40% 50% 1 2 3 4 5 6 7 8 9
Average skill level= 7.7 Average skill level= 6.3
8% 8% 8% 24% 27% 8% 14% 3% 0% 5% 10% 15% 20% 25% 30% 1 2 3 4 5 6 7 8 9
3% 3% 7% 23% 30% 13% 17% 3% 0% 5% 10% 15% 20% 25% 30% 35% 1 2 3 4 5 6 7 8 9
Average skill level= 6.0 Average skill level= 5.5
Average number of attackers per Honeypot type
1.18 1.44 1 1.20
0.5 1 1.5 2
Honeypot type Average number of attackers
HP1 HP2 HP3 All