the imitation game the new frontline of security fighting
play

The Imitation Game: The New Frontline of Security Fighting Robots - PowerPoint PPT Presentation

The Imitation Game: The New Frontline of Security Fighting Robots Weve been warned for a long time Many robots are good Some robots are creepy but still good Some robots replicate rapidly Robots can overwhelm our best defenses Robots can


  1. The Imitation Game: The New Frontline of Security

  2. Fighting Robots

  3. We’ve been warned for a long time

  4. Many robots are good

  5. Some robots are creepy but still good

  6. Some robots replicate rapidly

  7. Robots can overwhelm our best defenses

  8. Robots can be difficult to spot

  9. Most human-like robots are incomplete simulations

  10. But that’s enough to fool many humans ( Ex Machina Tinder marketing campaign)

  11. How do you identify a robot?

  12. Alan Turing

  13. Alan Turing

  14. The Imitation Game as described in Computing Machinery and Intelligence (Turing, 1950)

  15. The Imitation Game as described in Computing Machinery and Intelligence (Turing, 1950)

  16. “Are there imaginable digital computers which would do well [in the imitation game]?”

  17. The Turing Test

  18. “Artificial Stupidity” ( The Economist , 1992) “Turing’s prediction may well come true. But it will be a dreadful anticlimax. The most obvious problem with Turing’s challenge is that there is no practical reason to create machine intelligences indistinguishable from human ones. People are in plentiful supply. Should a shortage arise, there are proven and popular methods for making more of them”

  19. The only point of passing the Turing Test is to fool humans. But there is a market for that.

  20. But computers have already passed “restricted” “Turing Tests”. “Human nature” is part of the key: entropy in every task we perform, e.g., typos.

  21. “We used to be pretty confident we knew the relative strengths and weaknesses of computers vis-a-vis humans. But computers have started making inroads in some unexpected areas.”

  22. Bots and Security

  23. OWASP Top 10

  24. OWASP Automated Threats to Web Applications

  25. From bots to botnets (from imitating people to imitating populations) • Single application running malicious • Collection of malicious bots • Large-scale threat from many IPs automated tasks • Easy to block based on IP or device • Hard to take down entirely fingerprint

  26. Botnets aren’t what you think they are

  27. Botnets are the building blocks of beating IP-based defenses • Passing a large-scale Turing Test: rather than imitating one user, they imitate a crowd • Assumption that IP address is a scarce resource is wrong • IP blacklisting and rate throttling are ineffective • Especially untrue in an IPv6 world

  28. What are bad guys doing with botnets?

  29. Financial Losses Caused by botnets $110 Billion FBI estimate, 2014 https://www.fbi.gov/news/testimony/taking-down-botnets Approximately 500 million computers are infected globally each year, translating into 18 victims per second

  30. Click fraud Pay-per-click model • $23B in annual revenue • >$100K per minute • One main incentive • Many methods •

  31. Click bots

  32. Many bots target login forms

  33. Account checking bots

  34. Credential Stuffing at Sony (2011) 15 million credentials leaked 93,000 matches on Sony site = 93,000 user accounts breached

  35. Botnets defeat all IP-based defenses 15 million credentials leaked Botnet tests for 93,000 matches on Sony site = password reuse 93,000 user accounts breached

  36. Tax Fraud Step 4: Receive fraudulent return Step 1: Gather “fullz” Step 2: Download tax Step 3: Use tax transcripts to file fraud credentials from black transcripts from IRS return in tax software market

  37. Online Banking Fraud

  38. Poker bots

  39. Ticketing bots

  40. Why is automation so easy?

  41. All websites present an API

  42. How can we stop bots?

  43. Make life harder for robots with our own robotic defenses

  44. CAPTCHA Wasting the world’s time for 15+ years and counting

  45. Every day, the world spends 17 person years solving CAPTCHAs (CMU Estimate)

  46. Metal CAPTCHA

  47. reCAPTCHA

  48. CAPTCHA beating tools

  49. But CAPTCHAs had a good idea: Can’t make successful attacks impossible , but you can make them more difficult and expensive

  50. To successfully imitate a crowd, there’s a lot more than IP addresses that attackers need to vary Screen resolution Timezone Browser version Language Fonts Browser Plugins Type of Pointing Device Many other browser features

  51. Generalized Attack Mitigation Framework Prevention Real-Time Detection Batch Detection & Investigation Reactive Investigation

  52. Generalized Attack Mitigation Removing Framework Attack Incentives Real-Time Reducing Attack Detection Surface Batch Detection Rules Near 
 Data Disrupting & Real-Time Feeds Deflecting Detection Proactive Attacks Manual Investigation Reactive Manual Investigation

  53. Need “robots” to fight robots

  54. Need “robots” to fight robots Source: io9, “Yes, Deckard’s A Replicant” (03-23-09)

  55. Thank you! Shuman Ghosemajumder sg@shapesecurity.com @ShapeSecurity

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend