The Imitation Game: The New Frontline of Security Fighting Robots - - PowerPoint PPT Presentation

the imitation game the new frontline of security fighting
SMART_READER_LITE
LIVE PREVIEW

The Imitation Game: The New Frontline of Security Fighting Robots - - PowerPoint PPT Presentation

The Imitation Game: The New Frontline of Security Fighting Robots Weve been warned for a long time Many robots are good Some robots are creepy but still good Some robots replicate rapidly Robots can overwhelm our best defenses Robots can


slide-1
SLIDE 1

The Imitation Game: The New Frontline of Security

slide-2
SLIDE 2
slide-3
SLIDE 3

Fighting Robots

slide-4
SLIDE 4

We’ve been warned for a long time

slide-5
SLIDE 5

Many robots are good

slide-6
SLIDE 6

Some robots are creepy but still good

slide-7
SLIDE 7

Some robots replicate rapidly

slide-8
SLIDE 8

Robots can overwhelm our best defenses

slide-9
SLIDE 9

Robots can be difficult to spot

slide-10
SLIDE 10

Most human-like robots are incomplete simulations

slide-11
SLIDE 11

But that’s enough to fool many humans

(Ex Machina Tinder marketing campaign)

slide-12
SLIDE 12

How do you identify a robot?

slide-13
SLIDE 13

Alan Turing

slide-14
SLIDE 14

Alan Turing

slide-15
SLIDE 15

The Imitation Game as described in Computing Machinery and Intelligence (Turing, 1950)

slide-16
SLIDE 16

The Imitation Game as described in Computing Machinery and Intelligence (Turing, 1950)

slide-17
SLIDE 17

“Are there imaginable digital computers which would do well [in the imitation game]?”

slide-18
SLIDE 18

The Turing Test

slide-19
SLIDE 19

“Artificial Stupidity” (The Economist, 1992)

“Turing’s prediction may well come true. But it will be a dreadful anticlimax. The most obvious problem with Turing’s challenge is that there is no practical reason to create machine intelligences indistinguishable from human ones. People are in plentiful supply. Should a shortage arise, there are proven and popular methods for making more of them”

slide-20
SLIDE 20

The only point of passing the Turing Test is to fool humans. But there is a market for that.

slide-21
SLIDE 21

But computers have already passed “restricted” “Turing Tests”.

“Human nature” is part of the key: entropy in every task we perform, e.g., typos.

slide-22
SLIDE 22

“We used to be pretty confident we knew the relative strengths and weaknesses of computers vis-a-vis humans. But computers have started making inroads in some unexpected areas.”

slide-23
SLIDE 23

Bots and Security

slide-24
SLIDE 24

OWASP Top 10

slide-25
SLIDE 25

OWASP Automated Threats to Web Applications

slide-26
SLIDE 26

From bots to botnets (from imitating people to imitating populations)

  • Collection of malicious bots
  • Large-scale threat from many IPs
  • Hard to take down entirely
  • Single application running malicious

automated tasks

  • Easy to block based on IP or device

fingerprint

slide-27
SLIDE 27

Botnets aren’t what you think they are

slide-28
SLIDE 28

Botnets are the building blocks

  • f beating IP-based defenses
  • Passing a large-scale Turing Test: rather than imitating one user, they

imitate a crowd

  • Assumption that IP address is a scarce resource is wrong
  • IP blacklisting and rate throttling are ineffective
  • Especially untrue in an IPv6 world
slide-29
SLIDE 29

What are bad guys doing with botnets?

slide-30
SLIDE 30

Financial Losses Caused by botnets

$110 Billion

Approximately 500 million computers are infected globally each year, translating into 18 victims per second

FBI estimate, 2014

https://www.fbi.gov/news/testimony/taking-down-botnets

slide-31
SLIDE 31
  • Pay-per-click model
  • $23B in annual revenue
  • >$100K per minute
  • One main incentive
  • Many methods

Click fraud

slide-32
SLIDE 32

Click bots

slide-33
SLIDE 33

Many bots target login forms

slide-34
SLIDE 34

Account checking bots

slide-35
SLIDE 35

Credential Stuffing at Sony (2011)

15 million credentials leaked 93,000 matches on Sony site = 93,000 user accounts breached

slide-36
SLIDE 36

Botnets defeat all IP-based defenses

15 million credentials leaked 93,000 matches on Sony site = 93,000 user accounts breached Botnet tests for password reuse

slide-37
SLIDE 37

Tax Fraud

Step 1: Gather “fullz” credentials from black market Step 3: Use tax transcripts to file fraud return in tax software Step 4: Receive fraudulent return Step 2: Download tax transcripts from IRS

slide-38
SLIDE 38

Online Banking Fraud

slide-39
SLIDE 39

Poker bots

slide-40
SLIDE 40

Ticketing bots

slide-41
SLIDE 41

Why is automation so easy?

slide-42
SLIDE 42

All websites present an API

slide-43
SLIDE 43

How can we stop bots?

slide-44
SLIDE 44

Make life harder for robots with

  • ur own robotic defenses
slide-45
SLIDE 45

CAPTCHA

Wasting the world’s time for 15+ years and counting

slide-46
SLIDE 46

Every day, the world spends 17 person years solving CAPTCHAs (CMU Estimate)

slide-47
SLIDE 47

Metal CAPTCHA

slide-48
SLIDE 48

reCAPTCHA

slide-49
SLIDE 49

CAPTCHA beating tools

slide-50
SLIDE 50

But CAPTCHAs had a good idea: Can’t make successful attacks impossible, but you can make them more difficult and expensive

slide-51
SLIDE 51

To successfully imitate a crowd, there’s a lot more than IP addresses that attackers need to vary

Screen resolution Timezone Browser version Language Fonts Browser Plugins Type of Pointing Device Many other browser features

slide-52
SLIDE 52

Prevention Real-Time Detection Batch Detection & Investigation Reactive Investigation

Generalized Attack Mitigation Framework

slide-53
SLIDE 53

Removing Attack Incentives Reducing Attack Surface Disrupting & Deflecting Attacks Real-Time Detection Near
 Real-Time Detection Batch Detection Rules Data Feeds Proactive Manual Investigation Reactive Manual Investigation

Generalized Attack Mitigation Framework

slide-54
SLIDE 54

Need “robots” to fight robots

slide-55
SLIDE 55

Source: io9, “Yes, Deckard’s A Replicant” (03-23-09)

Need “robots” to fight robots

slide-56
SLIDE 56

Thank you! Shuman Ghosemajumder sg@shapesecurity.com @ShapeSecurity