Overview of UA Ongoing Cybersecurity Projects The image cannot be - - PowerPoint PPT Presentation

overview of ua ongoing
SMART_READER_LITE
LIVE PREVIEW

Overview of UA Ongoing Cybersecurity Projects The image cannot be - - PowerPoint PPT Presentation

Overview of UA Ongoing Cybersecurity Projects The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x


slide-1
SLIDE 1

First Franco-American Workshop October 17-18, 2013, Lyon France

Overview of UA Ongoing Cybersecurity Projects

Salim Hariri, UA-Site-Director

NSF Cloud and Autonomic Computing Center

hariri@email.arizona.edu nsfcac.arizona.edu (520) 621-4378

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you
slide-2
SLIDE 2

First Franco-American Workshop October 17-18, 2013, Lyon France

  • Intrusion Resilient Cloud Services
  • AuDIT: Automated Detection of Insider Threat
  • 4.2 Million NSF Award for Cybersecurity Scholarship for Service Project at The

University of Arizona

  • 1.2 Million NSF Award – Hacker Web: Securing Cyber Space: Understanding

the Cyber Attackers and Attacks via Social Media Analytics

  • Ask CyPert about Cybersecurity Education and Training Programs
  • Autonomic Software Protection System (ASPS), and Critical Infrastructure

Protection (ACIP) System

  • Smart Buildings and Environments
  • Anomaly based Detection of Attacks on Wireless Ad Hoc Networks
  • Autonomic Management of Data Center and Cloud Resources
  • Autonomic Programming Paradigm

On Going UA CAC Projects

Supported by: NSF, AFOSR, ARL, AFRL, Intel, IBM, Microsoft, Raytheon, Imaginestics, ISCA Corp, AVIRTEK and Rubio Pharma

slide-3
SLIDE 3

First Franco-American Workshop October 17-18, 2013, Lyon France 3

  • Cyberspace complexity and dynamism

make it infeasible for humans to effectively secure and protect

  • Current techniques are manual driven,

mainly signature base, reactive, and not robust or resilient

  • Autonomic Cyber Security (ACS) is a

promising paradigm to address current and future cybersecurity challenges

Cyber Security Challenges

slide-4
SLIDE 4

First Franco-American Workshop October 17-18, 2013, Lyon France www.ece.arizon aledu/~hpdc

.

Need Biological Like Cyber Nervous System (CNS) that we refer to as ACS. ACS can secure and protect software systems, hardware resources and information services without conscious involvement of users or system administrators

Autonomic Cyber Security (ACS)

  • without requiring
  • ur conscious effort

when we run, it increases our heart and breathing rate

slide-5
SLIDE 5

First Franco-American Workshop October 17-18, 2013, Lyon France

ACS Development Methodology

Cyberinfr astructure

Monitoring Feature Selection Aggregate and Correlate

Anomaly Behavior Analysis Risk and Impact Analysis

Automated Semi Automated Actions

Close Ports Change Policies Isolate router

slide-6
SLIDE 6

First Franco-American Workshop October 17-18, 2013, Lyon France

ACS Capabilities

  • Developing an innovative technology to build Autonomic

Cyber Security (ACS) with capabilities similar to the human nervous system,

– Software systems, computers, and networks that can self- manage and proactively protect themselves in real-time with little or no involvement of users or system administrators. – These systems just focus on functions they provide while the ACS performs what is necessary to self-protect their

  • perations and services.
slide-7
SLIDE 7

First Franco-American Workshop October 17-18, 2013, Lyon France

ACS Key Components

  • Automated and Integrated Management (AIM)

Methodology

  • Appflow: A data structure that captures the current

state of the system

  • Anomaly Behavior Analysis (ABA) Methodology – low

false alarms, and successfully implemented to TCP, UPD, IP, MAC, DNS, HTTP, WiFi, Modbus, etc.

  • Self-Management: It is a software engine to provide

automated and adaptive management services for hardware/software resources

  • Software Behavior Encryption (SBE)

– Based on Moving Target Defense (MTD) technique

slide-8
SLIDE 8

First Franco-American Workshop October 17-18, 2013, Lyon France

CAC Cybersecurity Test-beds

!

GPU

Global Memory

Multiprocessor 1

Shared Memory

Process

  • r 1

Regist ers

Processo r 8 ‏

Regist ers

Multiprocessor N ‏

Shared Memory

Processo r 1 ‏

Regist ers

Process

  • r 8

Regist ers

Hos t Mac hine

Host Main Mem

  • ry‏

Texture Memory Constant Memory

… …

Smart Grid Wireless Test-bed Private Cloud Smart Building GPU Cluster

slide-9
SLIDE 9

First Franco-American Workshop October 17-18, 2013, Lyon France

Application Flow (Appflow)

A data structure used for holding the monitored features associated with all resources used by an application at runtime Similar to the biological measurements (heart rate, body temperature, blood pressure, cholesterol, etc.

slide-10
SLIDE 10

First Franco-American Workshop October 17-18, 2013, Lyon France

AppFlow Behavior at Runtime

t ss ss t t t ss dz dz dz dz steady-state behaviour transient behaviour safe operating zone anomalous operating zone decision

AppFlow = f ( SysCall) Time AppFlow = f ( Cpu, Mem, IO, Net)

slide-11
SLIDE 11

First Franco-American Workshop October 17-18, 2013, Lyon France

Decision Fusion

Flow Flow DB DB Payload Payload DB DB Application Layer Application Layer Behavior Analysis Behavior Analysis Transport Layer Transport Layer Behavior Analysis Behavior Analysis Network Layer Network Layer Behavior Analysis Behavior Analysis

  • Multi-Level Behavior

Analysis Link Layer Link Layer Behavior Analysis Behavior Analysis Online Monitoring : NetFlow & AppFlow

Anomaly Behavior Analysis (ABA)

  • ABA performs fine-grained

behavior analysis of applications, software systems, and protocols to determine whether they are

  • perating normally or not
  • The only assumption it

makes that we know how the analyzed component behaves when it is operating normally

  • This allows us to detect any

unknown attacks (zero attack detection)

slide-12
SLIDE 12

First Franco-American Workshop October 17-18, 2013, Lyon France

Application Behavior Analysis: AppFlow based Methodology

Application Flow Repository

Application Execution Environment Application Monitoring Application Features Selection Features Aggregation and Correlation

slide-13
SLIDE 13

First Franco-American Workshop October 17-18, 2013, Lyon France

Application Behavior Analysis

Current State Detection Application Flow Repository Next State prediction Knowledge Application Behavior Analysis and Resources Allocation Engine Training Run Time Environment Decision

slide-14
SLIDE 14

First Franco-American Workshop October 17-18, 2013, Lyon France

TCP Behavior Analysis

2/18 ¡ 2 ¡ 2 ¡ 18/16 ¡ 16 ¡ 2/18 ¡ 1 ¡ 1 ¡ 1/16 ¡ 1 ¡ 16 ¡ 16 ¡ 1/16 ¡ 1/16 ¡ 16 ¡

( ¡Normal ¡/ ¡

Abnormal) ¡ N-­‑gram ¡ Database ¡

Training

slide-15
SLIDE 15

First Franco-American Workshop October 17-18, 2013, Lyon France

Statistical Distribution of System Calls (Normal vs Abnormal)

Time SysCall

Fault Injection Point

Abnormal Transaction Normal Transaction

11/12/13 15

slide-16
SLIDE 16

First Franco-American Workshop October 17-18, 2013, Lyon France

Automated and Integrated Management (AIM) Engine

slide-17
SLIDE 17

First Franco-American Workshop October 17-18, 2013, Lyon France

ANOMALY BEHAVIOR ANALYSIS (ABA) OF DNS PROTOCOL

slide-18
SLIDE 18

First Franco-American Workshop October 17-18, 2013, Lyon France

Decision Fusion

Flow Flow DB DB Payload Payload DB DB Application Layer Application Layer Behavior Analysis Behavior Analysis Transport Layer Transport Layer Behavior Analysis Behavior Analysis Network Layer Network Layer Behavior Analysis Behavior Analysis

  • Multi-Level Behavior

Analysis Link Layer Link Layer Behavior Analysis Behavior Analysis Online Monitoring : NetFlow & AppFlow

Anomaly Behavior Analysis (ABA) Methodology

slide-19
SLIDE 19

First Franco-American Workshop October 17-18, 2013, Lyon France

DNS Behavior Analysis Unit

slide-20
SLIDE 20

First Franco-American Workshop October 17-18, 2013, Lyon France

DNS Attacks

  • Cache Poisoning
  • DNS Hijacking
  • DNS Amplification
  • DDoS
  • Origination Modification
  • Zone Transfer
slide-21
SLIDE 21

First Franco-American Workshop October 17-18, 2013, Lyon France

DNS Behavior Analysis Unit

11/12/13 21

slide-22
SLIDE 22

First Franco-American Workshop October 17-18, 2013, Lyon France

DNS BAU Results

The anomaly score distribution for different type of attack traffic

slide-23
SLIDE 23

First Franco-American Workshop October 17-18, 2013, Lyon France

DNS Results

ROC (Receiver Operating Characteristics) for different n-gram sizes.

slide-24
SLIDE 24

First Franco-American Workshop October 17-18, 2013, Lyon France

ABA for WiFi (802.11) Protocol

!

slide-25
SLIDE 25

First Franco-American Workshop October 17-18, 2013, Lyon France

Wireless Flow Key Analysis

𝒐𝒒 𝒐𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)=∑​𝒐𝒉 𝒐𝒉𝒔𝒃𝒏↓𝒋 𝝑𝒈 𝝑𝒈𝒎𝒑𝒙 𝒑𝒙↑▒𝒐 ▒𝒐(𝒐​ 𝒉𝒔𝒃𝒏↓ 𝒉𝒔𝒃𝒏↓𝒋 ) 𝐨(𝐨​𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 )=𝐧𝐣𝐨 𝐧𝐣𝐨(𝐝𝐩𝐯 𝐩𝐯𝐨𝐮(𝐨​ 𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 ), ¡𝐧𝐩𝐝 𝐩𝐝(𝐨​𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 )) 𝒃𝒎𝒎𝒒 𝒃𝒎𝒎𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)= ¡∑​𝒐𝒉 𝒐𝒉𝒔𝒃𝒏↓𝒋 𝝑𝒈𝒎𝒑𝒙↑▒𝒅𝒑𝒗𝒐𝒖 𝒐𝒖(𝒐​𝒉𝒔𝒃𝒏↓ 𝒉𝒔𝒃𝒏↓𝒋 ) 𝒕𝒅 𝒕𝒅𝒑𝒔𝒇(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)=(𝟐−​𝒐𝒒 𝒐𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)/ 𝒃𝒎𝒎𝒒 𝒃𝒎𝒎𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙) )×𝟐𝟏𝟏 𝟐𝟏𝟏

Frame Control Duration ID Address 1 Address 2 Address 3 Sequence Control Address 4 Network Data FCS Protocol Version Type SubType To DS From DS More Frag Retry Power Mgmt More Data WEP Order

2 Bytes 2 Bytes 6 Bytes 6 Bytes 6 Bytes 2 Bytes 6 Bytes 0 to 2312 Bytes 4 Bytes 2 bits 2 bits 4 bits 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit

Type SubType Retry SrcMAC DestMAC Flow Key N-Gram Features Filter retransmission frames

Feature ¡Extraction

Address 1 Address 2 Address 3 Address 4 To DS From DS Extracts source/destination Address

count (ngrami): frequency of the ngrami in the flow moc (ngrami): maximum observed count for ngrami during training np (flow): number of normal n-gram patterns in the flow allp (flow): number of all observed patterns in that flow

slide-26
SLIDE 26

First Franco-American Workshop October 17-18, 2013, Lyon France

Experimental Results and Evaluation

  • We collected around 216 million frames
  • For 4-grams, we observed 922 unique

patterns from analyzing 102 Million frames

10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90

Percentage ¡of ¡the ¡flows a-­‑score ¡(Anomaly ¡Score)

Normal ¡

5 10 15 20 10 20 30 40 50 60 70 80 90 100

Percentage ¡of ¡ ¡flows a-­‑score ¡(Anomaly ¡Score)

Fake ¡Authentication

slide-27
SLIDE 27

First Franco-American Workshop October 17-18, 2013, Lyon France

AuDIT: Automated Detection of Insider Threat

slide-28
SLIDE 28

First Franco-American Workshop October 17-18, 2013, Lyon France

Insider Threats

  • A current or former employee or business partner who has

authorized access to an organization's resources and intentionally misused that access (CERT, 2012)

  • Cited as one of the greatest security threats to organizations

(e.g., Boss et al. 2009; Holmlund et al. 2011)

– 46% of security breaches are caused by insiders (U.S. Secret

Service, 2010)

– Costs “tens, if not hundreds of billions of dollars” (United Nations,

2005, p. xxiii)

– Takes an average of 416 days to detect a breach (HP Cyber Risk

Report, 2012)

  • Three proposed solutions: AuDIT, CAT, and ADMIT
slide-29
SLIDE 29

First Franco-American Workshop October 17-18, 2013, Lyon France

Detecting Insider Threats

  • Examples

– Polygraph – Log analysis – Investigation surveys – Pre-employment screening surveys

  • Shortcomings

– Polygraphs are expensive, time consuming, not always legal, not scalable – Log analysis is time consuming and post-hoc – Insider threats can lie in surveys

slide-30
SLIDE 30

First Franco-American Workshop October 17-18, 2013, Lyon France

Insider Threats

  • Illicit activates cause a stage change in individuals (e.g., heightened

emotion, stress, etc.)

  • Establish a ‘normal’ baseline of individuals
  • Detects anomalies through mouse / keystroke analysis and system usage

characteristics

– E.g., detect that someone is experiencing heightened emotion while copying a file from a sensitive directory

Typing Dynamics / Mousing Features Duration Trials Deception / Illicit Act

slide-31
SLIDE 31

First Franco-American Workshop October 17-18, 2013, Lyon France

AuDIT: Automated Detection of Insider Threat

Integrates human behavioral monitoring via non-invasive mouse and keyboard usage patterns with system resource usage for detecting anomalies that could be indicative of insider threats.

slide-32
SLIDE 32

First Franco-American Workshop October 17-18, 2013, Lyon France

AuDIT Methodology

  • Establish a ‘normal’ baseline of individuals for

resource usage and mouse / keyboard usage

  • Detect anomalies through continuous monitoring
  • f mouse / keystroke use and system resource use
  • E.g., detect that someone is experiencing heightened

emotion while copying a file from a sensitive directory that they have never done before

slide-33
SLIDE 33

First Franco-American Workshop October 17-18, 2013, Lyon France

AuDIT Framework

slide-34
SLIDE 34

First Franco-American Workshop October 17-18, 2013, Lyon France

CAT: Continuous Authentication Tool

  • Insider threats:

– Steal credentials (user names, passwords, etc.) – Access unlocked computers – Disguise identity

  • People have a unique mousing

and typing signature

– How / way you mouse – How / way you type

  • People have unique system

usage patterns

– Time of day, applications, etc.

slide-35
SLIDE 35

First Franco-American Workshop October 17-18, 2013, Lyon France

Cyber-Social Behavior Metrics

User

iPad Etc. Computer Program ¡1

(e.g., ¡Word)

Program ¡1

(e.g., ¡IE)

Etc.

How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc. How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc. How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc.

App ¡1

(e.g., ¡Word)

App ¡1

(e.g., ¡IE)

Etc.

How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc.

A ¡person’s ¡devices Profile ¡of ¡what ¡programs a ¡person ¡uses ¡ Signature ¡

How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc. How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc. Biometric ¡Features ¡ (previous ¡research) Behavioral ¡Features (our ¡research)

slide-36
SLIDE 36

First Franco-American Workshop October 17-18, 2013, Lyon France

Building a Cyber DNA

Feature Uniqueness Score How you mouse .1 (1 out of 10 mouse like you) The way you mouse .1 ( 1 out of 10 mouse the same way) How you type .1 ( 1 out of 10 type like you) The way you type .1 ( 1 out of 10 type the same way) Device, Application, Time of Day, Etc… Etc… Total .1 x .1 x .1 x …. * .1 = 0.0___001 (potentially 1 in 10,___000 have the same cyber DNA signature)

Match

More closely follows average Fewer measurements outside SD (21%)

Intruder

More deviations from average More measurements outside SD (50%)

User Signatures

slide-37
SLIDE 37

First Franco-American Workshop October 17-18, 2013, Lyon France

ADMIT: Automated Detection Method for Insider Threat

  • Diagnose insider threats in

screening surveys through monitoring mousing behavior

  • Insider threats will likely

show a difference in mouse movements for three reasons: – Cognitive conflict – Arousal – Task-Induced Search Bias

slide-38
SLIDE 38

First Franco-American Workshop October 17-18, 2013, Lyon France

Selected Results

deceptive truthful truthful deceptive truthful deceptive Within: Key questions (dotted lines) vs. Control questions (solid line) for insider threats deceptive truthful

slide-39
SLIDE 39

First Franco-American Workshop October 17-18, 2013, Lyon France

ADMIT Status

  • 2000 human subjects tested
  • Equal or beating polygraph
  • Prototype built, Amazon cloud
  • Building management dashboard, email

deployment, and data visualization

  • Looking for field test site
slide-40
SLIDE 40

First Franco-American Workshop October 17-18, 2013, Lyon France

Application of ADMIT

  • Insider Threat Event Investigation
  • Employment screening
  • Health care evaluations
  • Annual (routine) employee integrity screening
  • Life and other insurance applications
  • Loan applications
  • Testing
  • Etc…

40

slide-41
SLIDE 41

First Franco-American Workshop October 17-18, 2013, Lyon France

Project Novelty

  • Mass deployable and easy to scale (Google
  • f Polygraph)
  • Language agnostic
  • Bias free
  • Unobtrusive
  • Not easily fooled
  • Guide which employees are not insider

threats

  • Discover networks of insider threats
  • Many applications

41

slide-42
SLIDE 42

First Franco-American Workshop October 17-18, 2013, Lyon France

HACKER WEB

slide-43
SLIDE 43

First Franco-American Workshop October 17-18, 2013, Lyon France

Research Framework

slide-44
SLIDE 44

First Franco-American Workshop October 17-18, 2013, Lyon France

Hacker Forum Collection

slide-45
SLIDE 45

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Collection & Analytics

slide-46
SLIDE 46

First Franco-American Workshop October 17-18, 2013, Lyon France

Social Media Analytics: Ideational, Textual and Interpersonal Information (SFLT)

46

slide-47
SLIDE 47

First Franco-American Workshop October 17-18, 2013, Lyon France

Project Objectives

  • Develop autonomic monitoring and

analysis of IRC hacker messages

  • Build an IRC testbed, to experiment with

and evaluate the effectiveness of our tools and algorithms

  • Identifying hackers relations, behaviors,

and interactions.

  • Identifying IRC based botnet
slide-48
SLIDE 48

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Background

  • The IRC (Internet Relay Chat) protocol is a

text based conferencing protocol, which has been developed in 1989.

  • The IRC protocol is based on the client/

server model, and it is designed to run in a distributed manner.

slide-49
SLIDE 49

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Background

  • The simplest architecture consists of a

server with multiple clients connect to it.

  • The server will handle message delivery

and multiplexing.

  • There are two types of clients:

– user clients – service clients.

slide-50
SLIDE 50

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Background

  • The user clients are text-based

interfaces that interactively communicate using IRC.

  • The service clients are used to provide

services to user clients, such as providing statistics.

slide-51
SLIDE 51

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Background

  • Servers relay all the communications

between the clients.

  • All messages from any server are

broadcast to all the other connected servers.

slide-52
SLIDE 52

First Franco-American Workshop October 17-18, 2013, Lyon France

Proposed Techniques

  • 1) IRC Server based technique
  • 2) IRC client based technique
slide-53
SLIDE 53

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Server based technique

slide-54
SLIDE 54

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Server based technique

The environment from outside will look like a regular IRC server that will be registered with one of the well-known IRC networks. The environment will consist of the following components:

  • IRC Server: This is a regular IRC server, which will allow the

interaction with the rest of the IRC network and also logging IRC messages, since all IRC servers receive information from all the nodes in the network.

  • Autonomic Monitoring: This component is responsible for picking

up all the IRC packets, and it will have policies that define which ports to monitor and when.

slide-55
SLIDE 55

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Server based technique

  • IRC Message Extraction: This component will extract IRC messages from

IRC packets, and categorize that into different IRC message types.

  • File Extraction: It will be responsible for detecting file transfer and

extracting files from communications. This will work with DCC transfers or URLs.

  • Conversation Historian: This module will be responsible for building

conversations from the IRC messages and storing those for analysis.

  • Malware Analysis: This module will use different tools to detect if the

shared files contain malware (Viruses, worms, Trojans, …).

  • Feature Extraction and Reduction: This module will extract all the

features needed to perform the analysis from the IRC Messages, Conversation History, and the Results of the Malware analysis. It will also reduce the complexity of the extracted features.

slide-56
SLIDE 56

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Server based technique

  • Social Media Analyzer: This is the core of the system, and it will be

responsible for detecting, classifying, measuring, and tracking the formation, development, and spread of topics, ideas, and concepts in cyber attacker social media communication. It will also identify important and influential cyber criminals and their interests, intent, sentiment, and opinions in online discourses. And it will induce and recognize attacker identities, online profiles/styles, communication genres, and interaction patterns.

  • Visualization: This module will provide an insight of strategic

communication in critical social media.

  • Autonomic Bot Generator: This component is responsible for

generating Bots that provide interaction mechanism with the

  • environment. The bot behaviors, types, and number is enforced

based on a preset policy.

slide-57
SLIDE 57

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Server based technique

  • Human Machine Interaction (HMI): This

provides the interface for administrator to control the environment.

  • System Control and Management: This

module is the one responsible for setting the policies based on the current environment situation and/or according to the administrator command through the HMI.

slide-58
SLIDE 58

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Client based technique

slide-59
SLIDE 59

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Client based technique

The environment will consist of the following components:

  • IRC Clients and Bots: These are regular IRC clients

and Bots, which will allow the interaction with the rest of the IRC network and also logging IRC messages.

  • Autonomic Monitoring: This component is responsible

for picking up all the IRC packets, and it will have policies that define which ports to monitor and when.

slide-60
SLIDE 60

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Client based technique

  • IRC Message Extraction: This component will extract IRC messages from

IRC packets, and categorize that into different IRC message types.

  • File Extraction: It will be responsible for detecting file transfer and

extracting files from communications. This will work with DCC transfers or URLs.

  • Conversation Historian: This module will be responsible for building

conversations from the IRC messages and storing those for analysis.

  • Malware Analysis: This module will use different tools to detect if the

shared files contain malware (Viruses, worms, Trojans, …).

  • Feature Extraction and Reduction: This module will extract all the

features needed to perform the analysis from the IRC Messages, Conversation History, and the Results of the Malware analysis. It will also reduce the complexity of the extracted features.

slide-61
SLIDE 61

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Client based technique

  • Social Media Analyzer: This is the core of the system, and it will be

responsible for detecting, classifying, measuring, and tracking the formation, development, and spread of topics, ideas, and concepts in cyber attacker social media communication. It will also identify important and influential cyber criminals and their interests, intent, sentiment, and opinions in online discourses. And it will induce and recognize attacker identities, online profiles/styles, communication genres, and interaction patterns.

  • Visualization: This module will provide an insight of strategic

communication in critical social media.

  • Autonomic Bot Generator: This component is responsible for

generating Bots that provide interaction mechanism with the

  • environment. The bot behaviors, types, and number is enforced

based on a preset policy.

slide-62
SLIDE 62

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Client based technique

  • Human Machine Interaction (HMI): This

provides the interface for administrator to control the environment.

  • System Control and Management: This

module is the one responsible for setting the policies based on the current environment situation and/or according to the administrator command through the HMI.

slide-63
SLIDE 63

First Franco-American Workshop October 17-18, 2013, Lyon France

IRC Messages Meta Data Extraction Semantic Role Parser Mapping Aggregate Correlate Message Stream Processing Cluster Classify associate Text Extraction Translate if not English Statistical Natural Language Parser Language Detection Keyword Extraction Noise Reduction

Features Extraction and Reduction from IRC Messages

slide-64
SLIDE 64

First Franco-American Workshop October 17-18, 2013, Lyon France

Conclusions

  • We cannot build perfect network centric systems for the

next generation Internet Of Everything's (IoE) services

  • Autonomic computing provides a promising paradigm to self

manage and self-protect next generation IoE services

  • Resilient techniques based on Software Behavior

Encryption and Moving Target Defense can lead to the development on Intrusion Tolerance Systems (ITS)

  • Anomaly behavior analysis will help driving when to change

the environment and respond optimally to attacks or malicious events.

slide-65
SLIDE 65

First Franco-American Workshop October 17-18, 2013, Lyon France

THANK YOU