First Franco-American Workshop October 17-18, 2013, Lyon France
Overview of UA Ongoing Cybersecurity Projects
Salim Hariri, UA-Site-Director
NSF Cloud and Autonomic Computing Center
Overview of UA Ongoing Cybersecurity Projects The image cannot be - - PowerPoint PPT Presentation
Overview of UA Ongoing Cybersecurity Projects The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x
First Franco-American Workshop October 17-18, 2013, Lyon France
NSF Cloud and Autonomic Computing Center
First Franco-American Workshop October 17-18, 2013, Lyon France
University of Arizona
the Cyber Attackers and Attacks via Social Media Analytics
Protection (ACIP) System
On Going UA CAC Projects
Supported by: NSF, AFOSR, ARL, AFRL, Intel, IBM, Microsoft, Raytheon, Imaginestics, ISCA Corp, AVIRTEK and Rubio Pharma
First Franco-American Workshop October 17-18, 2013, Lyon France 3
First Franco-American Workshop October 17-18, 2013, Lyon France www.ece.arizon aledu/~hpdc
.
Need Biological Like Cyber Nervous System (CNS) that we refer to as ACS. ACS can secure and protect software systems, hardware resources and information services without conscious involvement of users or system administrators
when we run, it increases our heart and breathing rate
First Franco-American Workshop October 17-18, 2013, Lyon France
ACS Development Methodology
Cyberinfr astructure
Monitoring Feature Selection Aggregate and Correlate
Anomaly Behavior Analysis Risk and Impact Analysis
Automated Semi Automated Actions
Close Ports Change Policies Isolate router
First Franco-American Workshop October 17-18, 2013, Lyon France
Cyber Security (ACS) with capabilities similar to the human nervous system,
– Software systems, computers, and networks that can self- manage and proactively protect themselves in real-time with little or no involvement of users or system administrators. – These systems just focus on functions they provide while the ACS performs what is necessary to self-protect their
First Franco-American Workshop October 17-18, 2013, Lyon France
Methodology
state of the system
false alarms, and successfully implemented to TCP, UPD, IP, MAC, DNS, HTTP, WiFi, Modbus, etc.
automated and adaptive management services for hardware/software resources
– Based on Moving Target Defense (MTD) technique
First Franco-American Workshop October 17-18, 2013, Lyon France
!
GPU
Global Memory
Multiprocessor 1
Shared Memory
Process
Regist ers
Processo r 8
Regist ers
Multiprocessor N
Shared Memory
Processo r 1
Regist ers
Process
Regist ers
Hos t Mac hine
Host Main Mem
Texture Memory Constant Memory
… …
Smart Grid Wireless Test-bed Private Cloud Smart Building GPU Cluster
First Franco-American Workshop October 17-18, 2013, Lyon France
A data structure used for holding the monitored features associated with all resources used by an application at runtime Similar to the biological measurements (heart rate, body temperature, blood pressure, cholesterol, etc.
First Franco-American Workshop October 17-18, 2013, Lyon France
t ss ss t t t ss dz dz dz dz steady-state behaviour transient behaviour safe operating zone anomalous operating zone decision
AppFlow = f ( SysCall) Time AppFlow = f ( Cpu, Mem, IO, Net)
First Franco-American Workshop October 17-18, 2013, Lyon France
Decision Fusion
Flow Flow DB DB Payload Payload DB DB Application Layer Application Layer Behavior Analysis Behavior Analysis Transport Layer Transport Layer Behavior Analysis Behavior Analysis Network Layer Network Layer Behavior Analysis Behavior Analysis
Analysis Link Layer Link Layer Behavior Analysis Behavior Analysis Online Monitoring : NetFlow & AppFlow
behavior analysis of applications, software systems, and protocols to determine whether they are
makes that we know how the analyzed component behaves when it is operating normally
unknown attacks (zero attack detection)
First Franco-American Workshop October 17-18, 2013, Lyon France
Application Flow Repository
Application Execution Environment Application Monitoring Application Features Selection Features Aggregation and Correlation
First Franco-American Workshop October 17-18, 2013, Lyon France
Current State Detection Application Flow Repository Next State prediction Knowledge Application Behavior Analysis and Resources Allocation Engine Training Run Time Environment Decision
First Franco-American Workshop October 17-18, 2013, Lyon France
2/18 ¡ 2 ¡ 2 ¡ 18/16 ¡ 16 ¡ 2/18 ¡ 1 ¡ 1 ¡ 1/16 ¡ 1 ¡ 16 ¡ 16 ¡ 1/16 ¡ 1/16 ¡ 16 ¡
( ¡Normal ¡/ ¡
Abnormal) ¡ N-‑gram ¡ Database ¡
First Franco-American Workshop October 17-18, 2013, Lyon France
Time SysCall
Fault Injection Point
Abnormal Transaction Normal Transaction
11/12/13 15
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
Decision Fusion
Flow Flow DB DB Payload Payload DB DB Application Layer Application Layer Behavior Analysis Behavior Analysis Transport Layer Transport Layer Behavior Analysis Behavior Analysis Network Layer Network Layer Behavior Analysis Behavior Analysis
Analysis Link Layer Link Layer Behavior Analysis Behavior Analysis Online Monitoring : NetFlow & AppFlow
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
11/12/13 21
First Franco-American Workshop October 17-18, 2013, Lyon France
The anomaly score distribution for different type of attack traffic
First Franco-American Workshop October 17-18, 2013, Lyon France
ROC (Receiver Operating Characteristics) for different n-gram sizes.
First Franco-American Workshop October 17-18, 2013, Lyon France
!
First Franco-American Workshop October 17-18, 2013, Lyon France
𝒐𝒒 𝒐𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)=∑𝒐𝒉 𝒐𝒉𝒔𝒃𝒏↓𝒋 𝝑𝒈 𝝑𝒈𝒎𝒑𝒙 𝒑𝒙↑▒𝒐 ▒𝒐(𝒐 𝒉𝒔𝒃𝒏↓ 𝒉𝒔𝒃𝒏↓𝒋 ) 𝐨(𝐨𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 )=𝐧𝐣𝐨 𝐧𝐣𝐨(𝐝𝐩𝐯 𝐩𝐯𝐨𝐮(𝐨 𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 ), ¡𝐧𝐩𝐝 𝐩𝐝(𝐨𝐡𝐬 𝐡𝐬𝐛𝐧 𝐛𝐧↓𝐣 )) 𝒃𝒎𝒎𝒒 𝒃𝒎𝒎𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)= ¡∑𝒐𝒉 𝒐𝒉𝒔𝒃𝒏↓𝒋 𝝑𝒈𝒎𝒑𝒙↑▒𝒅𝒑𝒗𝒐𝒖 𝒐𝒖(𝒐𝒉𝒔𝒃𝒏↓ 𝒉𝒔𝒃𝒏↓𝒋 ) 𝒕𝒅 𝒕𝒅𝒑𝒔𝒇(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)=(𝟐−𝒐𝒒 𝒐𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙)/ 𝒃𝒎𝒎𝒒 𝒃𝒎𝒎𝒒(𝒈𝒎𝒑 𝒈𝒎𝒑𝒙) )×𝟐𝟏𝟏 𝟐𝟏𝟏
Frame Control Duration ID Address 1 Address 2 Address 3 Sequence Control Address 4 Network Data FCS Protocol Version Type SubType To DS From DS More Frag Retry Power Mgmt More Data WEP Order
2 Bytes 2 Bytes 6 Bytes 6 Bytes 6 Bytes 2 Bytes 6 Bytes 0 to 2312 Bytes 4 Bytes 2 bits 2 bits 4 bits 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bitType SubType Retry SrcMAC DestMAC Flow Key N-Gram Features Filter retransmission frames
Feature ¡Extraction
Address 1 Address 2 Address 3 Address 4 To DS From DS Extracts source/destination Address
count (ngrami): frequency of the ngrami in the flow moc (ngrami): maximum observed count for ngrami during training np (flow): number of normal n-gram patterns in the flow allp (flow): number of all observed patterns in that flow
First Franco-American Workshop October 17-18, 2013, Lyon France
patterns from analyzing 102 Million frames
10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90Percentage ¡of ¡the ¡flows a-‑score ¡(Anomaly ¡Score)
Normal ¡
5 10 15 20 10 20 30 40 50 60 70 80 90 100
Percentage ¡of ¡ ¡flows a-‑score ¡(Anomaly ¡Score)
Fake ¡Authentication
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
authorized access to an organization's resources and intentionally misused that access (CERT, 2012)
(e.g., Boss et al. 2009; Holmlund et al. 2011)
– 46% of security breaches are caused by insiders (U.S. Secret
Service, 2010)
– Costs “tens, if not hundreds of billions of dollars” (United Nations,
2005, p. xxiii)
– Takes an average of 416 days to detect a breach (HP Cyber Risk
Report, 2012)
First Franco-American Workshop October 17-18, 2013, Lyon France
– Polygraph – Log analysis – Investigation surveys – Pre-employment screening surveys
– Polygraphs are expensive, time consuming, not always legal, not scalable – Log analysis is time consuming and post-hoc – Insider threats can lie in surveys
First Franco-American Workshop October 17-18, 2013, Lyon France
emotion, stress, etc.)
characteristics
– E.g., detect that someone is experiencing heightened emotion while copying a file from a sensitive directory
Typing Dynamics / Mousing Features Duration Trials Deception / Illicit Act
First Franco-American Workshop October 17-18, 2013, Lyon France
Integrates human behavioral monitoring via non-invasive mouse and keyboard usage patterns with system resource usage for detecting anomalies that could be indicative of insider threats.
First Franco-American Workshop October 17-18, 2013, Lyon France
emotion while copying a file from a sensitive directory that they have never done before
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
– Steal credentials (user names, passwords, etc.) – Access unlocked computers – Disguise identity
and typing signature
– How / way you mouse – How / way you type
usage patterns
– Time of day, applications, etc.
First Franco-American Workshop October 17-18, 2013, Lyon France
User
iPad Etc. Computer Program ¡1
(e.g., ¡Word)
Program ¡1
(e.g., ¡IE)
Etc.
How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc. How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc. How ¡You ¡Mouse Way ¡You ¡Mouse How ¡You ¡Type Way ¡You ¡Type How ¡often ¡you ¡ use ¡the ¡program What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡ program Etc.
App ¡1
(e.g., ¡Word)
App ¡1
(e.g., ¡IE)
Etc.
How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc.
A ¡person’s ¡devices Profile ¡of ¡what ¡programs a ¡person ¡uses ¡ Signature ¡
How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc. How ¡You ¡Drag Way ¡You ¡Drag How ¡you ¡Select Way ¡You ¡Select How ¡often ¡you ¡ use ¡the ¡app What ¡ functionalities ¡ you ¡use What ¡times ¡do ¡ you ¡use ¡the ¡app Etc. Biometric ¡Features ¡ (previous ¡research) Behavioral ¡Features (our ¡research)
First Franco-American Workshop October 17-18, 2013, Lyon France
Feature Uniqueness Score How you mouse .1 (1 out of 10 mouse like you) The way you mouse .1 ( 1 out of 10 mouse the same way) How you type .1 ( 1 out of 10 type like you) The way you type .1 ( 1 out of 10 type the same way) Device, Application, Time of Day, Etc… Etc… Total .1 x .1 x .1 x …. * .1 = 0.0___001 (potentially 1 in 10,___000 have the same cyber DNA signature)
Match
More closely follows average Fewer measurements outside SD (21%)
Intruder
More deviations from average More measurements outside SD (50%)
User Signatures
First Franco-American Workshop October 17-18, 2013, Lyon France
screening surveys through monitoring mousing behavior
show a difference in mouse movements for three reasons: – Cognitive conflict – Arousal – Task-Induced Search Bias
First Franco-American Workshop October 17-18, 2013, Lyon France
deceptive truthful truthful deceptive truthful deceptive Within: Key questions (dotted lines) vs. Control questions (solid line) for insider threats deceptive truthful
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
40
First Franco-American Workshop October 17-18, 2013, Lyon France
41
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
46
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
The environment from outside will look like a regular IRC server that will be registered with one of the well-known IRC networks. The environment will consist of the following components:
interaction with the rest of the IRC network and also logging IRC messages, since all IRC servers receive information from all the nodes in the network.
up all the IRC packets, and it will have policies that define which ports to monitor and when.
First Franco-American Workshop October 17-18, 2013, Lyon France
IRC packets, and categorize that into different IRC message types.
extracting files from communications. This will work with DCC transfers or URLs.
conversations from the IRC messages and storing those for analysis.
shared files contain malware (Viruses, worms, Trojans, …).
features needed to perform the analysis from the IRC Messages, Conversation History, and the Results of the Malware analysis. It will also reduce the complexity of the extracted features.
First Franco-American Workshop October 17-18, 2013, Lyon France
responsible for detecting, classifying, measuring, and tracking the formation, development, and spread of topics, ideas, and concepts in cyber attacker social media communication. It will also identify important and influential cyber criminals and their interests, intent, sentiment, and opinions in online discourses. And it will induce and recognize attacker identities, online profiles/styles, communication genres, and interaction patterns.
communication in critical social media.
generating Bots that provide interaction mechanism with the
based on a preset policy.
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
The environment will consist of the following components:
and Bots, which will allow the interaction with the rest of the IRC network and also logging IRC messages.
for picking up all the IRC packets, and it will have policies that define which ports to monitor and when.
First Franco-American Workshop October 17-18, 2013, Lyon France
IRC packets, and categorize that into different IRC message types.
extracting files from communications. This will work with DCC transfers or URLs.
conversations from the IRC messages and storing those for analysis.
shared files contain malware (Viruses, worms, Trojans, …).
features needed to perform the analysis from the IRC Messages, Conversation History, and the Results of the Malware analysis. It will also reduce the complexity of the extracted features.
First Franco-American Workshop October 17-18, 2013, Lyon France
responsible for detecting, classifying, measuring, and tracking the formation, development, and spread of topics, ideas, and concepts in cyber attacker social media communication. It will also identify important and influential cyber criminals and their interests, intent, sentiment, and opinions in online discourses. And it will induce and recognize attacker identities, online profiles/styles, communication genres, and interaction patterns.
communication in critical social media.
generating Bots that provide interaction mechanism with the
based on a preset policy.
First Franco-American Workshop October 17-18, 2013, Lyon France
First Franco-American Workshop October 17-18, 2013, Lyon France
IRC Messages Meta Data Extraction Semantic Role Parser Mapping Aggregate Correlate Message Stream Processing Cluster Classify associate Text Extraction Translate if not English Statistical Natural Language Parser Language Detection Keyword Extraction Noise Reduction
First Franco-American Workshop October 17-18, 2013, Lyon France
next generation Internet Of Everything's (IoE) services
manage and self-protect next generation IoE services
Encryption and Moving Target Defense can lead to the development on Intrusion Tolerance Systems (ITS)
the environment and respond optimally to attacks or malicious events.
First Franco-American Workshop October 17-18, 2013, Lyon France