Cyber Security: Evaluating the Effects of Attack Strategy and Base

advertisement
Cyber Security: Evaluating the Effects of Attack Strategy and Base Rate through
Instance-Based Learning
Aman Arora (aman@students.iitmandi.ac.in)
School of Computing and Electrical Engineering
Indian Institute of Technology, Mandi, India
Varun Dutt (varun@iitmandi.ac.in)
School of Computing and Electrical Engineering
School of Humanities and Social Sciences
Indian Institute of Technology, Mandi, India
cyber-world like ours, we must have defenses to keep us
safe. In order to create appropriate defenses against cyber
attacks, the role security analysts, a human decision maker
whose main role is to protect computer networks from cyber
attacks, is becoming indispensable (Jajodia, Liu, Swarup, &
Wang, 2010). Given the growing demand, companies have
started employing security analyst. However, currently not
much emphasis has been laid on how different
environmental factors (e.g., attack strategy and base rate)
would affect the analyst’s accurate and timely detection of
cyber attacks.
One of the researches done in this field indicates that the
analyst’s accurate and timely threat detection is likely to be
a function of prior experiences with cyber attacks and
tolerance to perceived threats (Dutt et al., in press;
McCumber, 2004; Salter, Saydjari, Schneier, & Wallner,
1998). Dutt et al. (in press) have given primary predictions
about a simulated analyst’s performance according to her
experience and tolerance to threats (or risk-taking). These
authors created a cognitive model of an analyst’s decisions,
based upon Instance-Based Learning Theory (IBLT;
Gonzalez & Dutt, 2011), and populated the model’s
memory with cyber threat and cyber non-threat experiences.
The model’s tolerance was determined by the number of
events it perceived as threats before it declared the sequence
of network events to be a cyber attack. Accordingly, a
model with a greater proportion of threat experiences was
more accurate and timely in detecting threats compared with
one with a smaller proportion of such experiences; whereas,
the tolerance did not influence model’s accuracy and
timeliness.
Although Dutt et al. (in press) have highlighted the role of
prior experience and risk-taking on cyber threat detection, it
is unclear how their results would vary due to the nature of
adversarial behaviors (an external factor). Thus, here we
simulate an analyst’s decision process through the
computational model developed by Dutt et al. (in press) and
derive predictions about analyst’s decisions in scenarios that
differ in adversarial behaviors. One characteristic of
adversary’s behavior is the attack strategy (patient or
impatient) being followed to infiltrate the network. An
impatient strategy is the strategy in which attacker passes all
threat events in the beginning of a sequence of network
events; whereas, a patient strategy will make attacker to
Abstract
Cyber attacks, the disruption of normal operations in a
computer network due to malicious events called cyber
threats, are becoming widespread. In order to check the
prevalence of cyber attacks the role of security analysts,
human decision makers whose job is to prevent cyber attacks,
is becoming extremely important. However, currently very
little is known on how security analysts might respond to
different attack strategies of an attacker in cyber attacks. Also,
little is known on how the proportion of threats (i.e., base
rate) in an attack scenario influences the analyst’s timely and
accurate detection of such attacks. In this paper, we use an
existing cognitive model of the security analyst, based upon
Instance-Based Learning Theory, and we evaluate the effects
of attack strategy and base rate on the model’s accurate and
timely detection of cyber-attacks in a simulated scenario. The
attack strategy was manipulated as: impatient (attacker injects
all threats in the beginning of the scenario) and patient
(attacker waits till the end of the scenario to inject threats);
and, base rate was manipulated as: common (13 out of 25
scenario events (52%) were threats) and rare (3 out of 25
scenario events (12%) were threats). Results reveal that the
attack strategy influences only the analyst’s accuracy and not
her timeliness; however, the base rate influences her
timeliness and not the accuracy. We discuss the implications
of our results for training analyst in their job.
Keywords: — cyber attacks; base rate; attack strategy;
Instance-based Learning Theory; accuracy; timeliness.
Introduction
According to the U.S. White House, “Cyberspace touches
nearly every part of our daily lives. It is the broadband
networks beneath us and the wireless signals around us, the
local networks in schools, hospitals, work-places and
business...Today’s world is more interconnected than ever
before.” These lines explicitly describe the inevitableness of
Internet. Yet, for all its advantages, increased connectivity
brings increased risk of theft, fraud, and abuse. As we are
becoming more reliant on modern technology, we are also
becoming more vulnerable to cyber attacks such as
Corporate Security Breaches, Spear Phishing, and Social
Media Fraud. With the prevalence of “Anonymous” and
“LulzSec” hacking groups and other threats to corporate and
national security, guarding against cyber attacks is
becoming a significant part of IT governance, especially
because most government agencies and private companies
have moved to online systems (Sideman, 2011). Thus, in a
336
wait till the end to inject the threats in a sequence of
network events. We also consider proportion of threat
events (i.e., base rate; common or rare) that an attacker uses
to attack a network. A common base rate is when the
attacker uses a large number of threat events in a cyber
attack; however, a rare base rate is when the analyst uses
only a smaller number of threat events in a cyber attack.
Next, a cyber-infrastructure and an IBL model of
analyst’s cyber threat detection are detailed. Then, we
describe the manipulations in the attack scenarios and detail
the results of our manipulations. We close this paper by
presenting a discussion of our findings and their
implications to training human analysts in their job.
Cyber Infrastructure
A corporate network may consist of different types of
servers and multiple layers of firewalls. We used a
simplified network configuration consisting of a web server,
a fileserver, and two firewalls (Ou, Boyer, & McQueen,
2006; Xie, Li, Ou, & Levy, 2010). An external firewall
(‘firewall 1’ in Figure 1) controls the flow of traffic between
the Internet and the Demilitarized zone (DMZ; a subnetwork that separates the Internet from the company’s
internal LAN network). Second firewall (‘firewall 2’ in
Figure 1) controls the traffic between the webServer and the
fileServer, a company’s internal LAN network. The
webServer interacts with outside world and it is behind the
DMZ. FileServer contains necessary information that
internal users (employees) use to do their daily operations.
FileServer is connected to workstations, which employees
use as a medium to interact with the fileServer and are
authorized to run executable files resting on the fileServer.
Generally, an attacker is identified as a computer on the
Internet that is trying to gain access to the internal corporate
servers and workStations. For this cyber-infrastructure,
attackers follow a pattern of “island-hopping” attack
(Jajodia et al., 2010; pp. 30), where the webServer is
compromised first, and then it is used to originate attacks on
the fileServer and other company workStations.
An attacker, in order to gain access to fileserver, will
need to pass at least 3 events (to get to webServer,
fileserver, and then to execute binaries inside fileServer).
Because of this reason, we define the rare base rate to
contain 3 threats out of total 25 network events (as it is
minimum an attacker may require).
The model discussed in this paper is presented with
different cyber events in a sequence, where these events
follow an attacker’s strategy, i.e., the sequence of events are
a combination of a base rate and timing strategy. Attack
sequences may be classified as rare-impatient, rare-patient,
common-impatient and common-patient depending upon the
combination of attack strategies being followed by attacker.
Rare-impatient attack sequence contains 3 out of total 25
network events as threats and are all being injected in the
beginning. Rare-patient also contains 3 threats but here
these are being injected in the end of sequence of 25
network events.
Figure 1: An Example Attack Scenario.
In common-impatient attack sequence there are 13
threats out of total 25 network events and these are being
injected with impatient strategy, i.e., all of them are being
injected in the beginning of the sequence; however, in
common-patient attack sequence these 13 threats are being
injected at the end of sequence. Nature of these attack
sequences is not known to the model; however, the model is
able to get alerts corresponding to some network events
(that are regarded as threats) generated from the intrusiondetection system (IDS) (Jajodia et al., 2010). Out of 25
events, some are threats that are initiated by an attacker (the
rest of the events are initiated by inside users). The model
does not know which events are generated by the attacker
and which are generated by corporate employees. By
perceiving network events in a sequence as threats or nonthreats, the model needs to identify, as early and accurately
as possible, whether the sequence constitutes a cyber attack.
Instance-Based Learning Theory (IBLT)
IBLT is a theory of how people make decisions from
experience in dynamic environments (Gonzalez & Dutt,
2011). Computational models based on IBLT have been
shown to generate accurate predictions of human behavior
in many dynamic decision-making situations similar to
those faced by analysts (Dutt et al., in press; Dutt &
Gonzalez, 2012; Gonzalez & Dutt, 2011; Gonzalez et al.,
2011). IBLT proposes that every decision situation is
represented as an experience called an instance that is stored
in memory. Each instance in memory is composed of two
parts: situation (S) (the knowledge of attributes that describe
an event), a Decision (D) (the action taken in such
situation), and utility (U) (a measure of expected result of a
decision that is to be made for an event). For a situation
337
involving securing a network from threats, the situation
attributes are those that can discriminate between threat and
non-threat events: the IP address of a computer (web-server,
file-server, or workstation, etc.) where the event occurred,
the directory location in which the event occurred, whether
the IDS raised an alert corresponding to the event, and
whether the operation carried out as part of the event(e.g., a
file execution) by a user of the network (which could be an
attacker) succeeded or failed. In the IBL model of a analyst,
an instance’s S part refers to the situation attributes defined
above; and the U slot refers to the expectation in memory
that a network event is a threat or not. For example, an
instance could be defined as [webserver, c:\, malicious code,
success; threat], where “webserver,” “c:\,” “malicious
code,” and “success” constitutes the instance’s S part; and
“threat” is the instance’s U part (the decision being binary:
threat or not, is not included in this model).
An instance is retrieved in the recognition phase from
memory according to an activation mechanism (Gonzalez et
al., 2003; Lejarraga et al., in press). The activation of an
instance i in memory is defined using a simplified version of
ACT-R’s activation equation:
Directory
Alert
Operation
∑
is the similarity component and represents
the mismatch between a situation's attributes and the
situation (S) part of an instance i in memory. The k is the
total number of attributes for a situation event that are used
to retrieve the instance i from memory. The value of k=4 as
there are 4 attributes (IP, directory, alert, and operation)
that characterize a situation in the network. The match scale
( ) reflects the amount of weighting given to the similarity
between an instance i’s situation part l and the
corresponding situation event’s attribute.
is generally a
negative integer with a common value of -1.0 for all
situation slots k of an instance i, and we assume this value
for the . The
or match similarities represents the
similarity between the value l of a situation event’s attribute
and the value in the corresponding situation part of an
instance i in memory. Typically,
is defined using a
squared distance between the situation event’s attributes and
the corresponding instance's situation slots (Shepard, 1962).
Thus,
is equal to the sum of squared differences
between a situation event’s attributes and the corresponding
instance's S part. In order to find the sum of these squared
differences, the situation events’ attributes and the values in
the corresponding S part of instances in memory were coded
using numeric codes. Table 1 shows the codes assigned to
the S part of instances and the situation events’ attributes.
The noise value (Anderson & Lebiere, 1998; Gonzalez
& Dutt, 2011) is defined as
The Bi equation is given by:
∑
{
)
}
In this equation, the frequency effect is provided by
,
the number of retrievals of the ith instance from memory in
the past. The recency effect is provided by
, the time
since the th past retrieval of the ith instance (in equation 2, t
denotes the current event number in the scenario). The d is
the decay parameter and has a default value of 0.5 in the
ACT-R architecture, and this is the value we assume for the
IBL model.
refers to the similarity between the attributes of the
situation and the attributes of the ith instance.
is defined
as,
(
Values
Codes
IP
Webserver
1
)
where,
is a random draw from a uniform distribution
bounded in [0, 1] for an instance i in memory. We set the
parameter s in an IBL model to make it a part of the
activation equation (equation 1). The s parameter has a
default value of 0.25 in the ACT-R architecture, and we
assume this default value in the IBL model.
We used IBLT to study the accurate and timely detection
of threats by cyber analysts because IBLT is known to make
better decisions compared to other models and techniques.
Basava, Ramakrishna and Varun in there paper “Cyber
Situation Awareness: Rational Methods versus InstanceBased Learning Theory for Cyber Threat Detection; ICCM”
Table 1: The coded values in the S part of instances in
memory and attributes of a situation event.
Attributes
2
3
-1001
1
1
0
1
0
∑
where i refers to the ith instance that is pre-populated in
memory, and i = 1,2, … constitutes the total number of prepopulated instances in memory; Bi is the base-level learning
mechanism and reflects both the recency and frequency of
use for the ith instance since the time it was created; and
is the noise value that is computed and added to an instance
i’s activation at the time of its retrieval attempt from
memory.
(
Fileserver
Workstation
Missing value
File X
Present
Absent
Successful
Unsuccessful
338
in this conference compare IBLT with Naïve Bayes
classifier which is a rational approach to make decisions.
There results depict that Naïve Bayes approach is poor in
terms of timeliness and accuracy as compared to the IBLT.
Hence, we ran our experiments with IBLT to study the
interaction of base rate and attack strategy in timely and
accurate detection of cyber attacks.
Accuracy
As shown in Figure 2, it was seen that d’ corresponding to
common base rate (-0.026) was greater than that for the rare
base rate (-0.75). So, the base rate did influence the model’s
accuracy (d’). Furthermore, as shown in Figure 3, the
accuracy for the impatient strategy (d’ = 3.48) was greater
than that for the patient strategy (d’ = -4.25). Thus, attack
strategy also influenced the accuracy.
However, the base rate did not play as big a role as that
played by strategy (see Figure 4). Strategy was found to
influence accuracy and its effect was irrespective of the base
rate. From Figure 4, an impatient strategy had a greater d’
(common-impatient = 4.23, rare-impatient = 2.72) compared
to a patient strategy (common-patient = -4.28, rare-patient =
-4.23).
Experiments
The IBL model used here has been taken from Dutt et al.
(in press). This model is presented with sequences of
network events that represent four strategies (commonpatient, common-impatient, rare-patient, rare-impatient) of
the attacker with tolerance fixed at 50% of base rate. All
sequences contained 25 network events. Model’s memory
was pre-populated with instances that represent analysts
with different experiences and the model was fixed to use
tolerance level of 0.5. The IBL model retrieved instance
with highest activation and made a decision about an event
being a threat or a non-threat.
We use only 500 simulations of the model as they were
sufficient for generating stable model results (Dutt et al., in
press). We ran 500 simulations (each simulation consisting
of 25 network events) and the model’s effectiveness was
evaluated using its accuracy and detection timing in four
groups defined by: strategy (patient and impatient) and base
rate (common and rare). Accuracy was determined by
computing the d’(Z(hitrate) – Z(false-alarmrate)), hitrate
(hits/(hits + misses)), and false-alarm rate = (falsealarms/(false-alarms + correct-rejections)) (Wickens, 2001)
over the course of 25 network events and averaged across
the 500 simulations. The decision of the model for each
network event was marked as a hit if an instance with its U
slot indicated a threat for an actual threat event in the
sequence. Similarly, the model’s decision was marked as a
false-alarm if an instance with its U slot indicated a threat
for an actual non-threat event in the sequence. Hits and
false-alarms were calculated for all events before model
declared a cyber attack and stopped, or when all the 25
events had occurred (whichever came first).
Furthermore, detection timing was calculated in each
simulation as the “proportion of attack steps,” defined as
100% - the percentage of threat events out of a total 25 that
have occurred after which the model classifies the event
sequence as a cyber attack and stops. Therefore, higher
percentages of attacks steps would indicate the model to be
timelier in detecting cyber attacks.
0.0
-0.1
-0.026 d'
-0.2
-0.3
Common
-0.4
Rare
-0.5
-0.6
-0.7
-0.8
-0.75
Figure 2: Accuracy(d’) as affected by base rate.
3.47
4.0
2.0
0.0
Impatient
d'
Patient
-2.0
-4.0
-4.26
-6.0
Figure 3: Accuracy(d’) as affected by strategy.
Results
We will be explaining the results obtained with the help of
figures presented in this paper from Figure 2 to Figure 7.
Each of these figures is a histogram where y axis
corresponds to accuracy or timeliness as mentioned across
respective figure and the bars represents attack scenario,
those can be decoded by the legend in each figure.
339
Common Patient
6
4.22
Common Impatient
4
2.72
2
Rare Patient
Rare Impatient
0
d'
-2
-4
-4.23
-4.28
-6
42
45
40
35
30
25
20
15
10
5
0
41
Impatient
Patient
Timeliness (%)
Figure 4: Accuracy(d’) as affected by different
combinations of base rate and strategy
Figure 6: Timeliness as affected by strategy.
60
Timeliness
After running the model it was observed that the
timeliness (Figure 5) for the rare scenario (36%) was higher
than that for the common scenario (47%). Thus, timeliness
was influenced by base rate. However, strategy did not
influence timeliness, as can be seen from Figure 6 both
strategies have almost same timeliness (impatient strategy
with timeliness of 42% and patient strategy with timeliness
of 41%). This means that strategy plays no role in the time it
takes to determine if there is an attack. Interaction of base
rate and strategy in determining the timeliness was
evaluated in Figure 7. Timeliness for common scenarios
(common-patient = 36%, common-impatient = 35%) were
lower than that in the rare scenarios (rare-patient = 46%,
rare-impatient = 49%). Also, timeliness did not vary much
for both strategies in both scenarios. Thus, there is only an
influence base rate on timeliness and not of strategy on
timeliness: The rare base rate caused model to be timelier.
Thus, to conclude, timeliness was affected by base rate.
40
Common Impatient
Rare Patient
Rare Impatient
10
0
Timeliness (%)
Figure 7: Timeliness as affected by different combinations
of base rate and strategy.
Discussion and Conclusions
Common
20
35
Common Patient
20
36
30
36
49
30
47
50
40
46
50
Rare
10
0
Timeliness (%)
Figure 5: Timeliness as affected by base rate
340
In this paper, we studied the effects of base rate and attack
strategy on the model’s accurate and timely detection of
cyber-attacks. Such an analysis is important as unlike the
cognitive factors (recency and tolerance) that are under the
direct control of analyst, the environmental factors (attack
strategy and base rate) are controlled by the attacker and
outside the direct control of the analyst. We find that both
these environmental factors, being outside the control of the
analyst, influence the analyst’s accuracy or timeliness.
First, the analyst’s accuracy was influenced by the strategy.
The model was more accurate when the strategy was
impatient compared to when it was patient. The likely
reason for this result is that an impatient strategy’s early
threats increase the activation of threat instances in the
model’s memory early on. Therefore, the increase in
activation is likely to make the model perform more
accurately against an impatient strategy compared to a
patient strategy.
Second, the timeliness was influenced by the base rate:
The model was timelier for the rare base rate compared to
the common base rate. This observation can be explained
based upon the definition of base rate, i.e., the proportion of
threats being passed among the 25 network events. If the
Jajodia, S., Liu, P., Swarup, V., & Wang, C. (2010). Cyber situational
awareness. New York, NY: Springer.
McCumber, J. (2004). Assessing and managing security risk in IT systems: A
structured methodology. Boca Raton, FL: Auerbach Publications.
Ou, X., Boyer, W. F., & McQueen, M. A. (2006). A scalable approach to attack
graph generation. In Proceedings of the 13th ACM Conference on
Computer and Communications Security (pp. 336-345). Alexandria,
VA: ACM. doi: 10.1145/1180405.1180446
Salter, C., Saydjari, O., Schneier, B., & Wallner, J. (1998). Toward a secure
system engineering methodology. In Proceedings of New Security
Paradigms Workshop (pp. 2-10). Charlottesville, VA: ACM. doi:
10.1145/310889.310900
Shepard, R .N. (1962). The analysis of proximities: multidimensional scaling
with an unknown distance function. Part I. Psychometrika, 27, 125–
140.
Sideman, A. (2011). Agencies must determine computer security teams in face
of
potential
federal
shutdown.
Retrieved
from
http://fcw.com/articles/2011/02/23/agencies-must-determinecomputer-security-teams-in-face-of-shutdown.aspx
Wickens, T. D. (2001). Elementary signal detection theory. New York, NY:
Oxford University Press, USA.
Xie, P., Li, J. H., Ou X., Liu, P., & Levy, R. (2010). Using Bayesian networks
for cyber security analysis. In Proceedings of the 2010 IEEE/IFIP
International Conference on Dependable Systems and Networks
(DSN) (pp. 211-220). Hong Kong, China: IEEE Press. doi:
10.1109/DSN.2010.5544924
proportion of threats is less (i.e., in rare scenario), it will
take less time for the model to declare a sequence of
network events as an attack compared to when the
proportion of threats is more (i.e., in the common scenario).
The activation of threat instances is likely increase faster for
the scenario with the rare base rate compared with the
scenario with the common base rate (because the instances
with the rare base rate are fewer in number and easy to
identify). This increase in activation in the rare scenario
would cause these activated instances to be retrieved from
memory often, causing the model to stop early.
Our results have important implications for training
analysts in their job. First, as both the base rate and strategy
influence the cyber threat detection, it is prudent to train
analysts on scenarios that differ in both these environmental
factors. Second, it is expected that analyst should be trained
in the common scenario and for a patient attack strategy as
in these cases the model’s performance was the poorest.
In these experiments, we overlooked the effects of
tolerance (risk-taking) by setting it up at 50% of base rate.
However, one expects that the model’s tolerance would
likely vary from one individual to another. More
specifically, the model’s ability would likely be influenced
by its risk-taking and varying the tolerance may have
significant effects on the model’s accurate and timely
detection of cyber-attacks. Thus, the next step in this
research would be to introduce tolerance as another
parameter and see its interaction with base rate and strategy.
We plan to undertake this idea as part of our ongoing
research on this topic.
Acknowledgements
We are very thankful to Dr. Varun Dutt, Assistant Professor,
Indian Institute of Technology, Mandi for guiding us in
difficult times on this project. Also, we are grateful to the
Indian Institute of Technology, Mandi for providing the
necessary capital and financial resources that made this
project possible in the first place. This research was also
partially supported by the Multidisciplinary University
Research Initiative Award on Cyber Situation Awareness
(MURI; #W911NF-09-1-0525) from Army Research Office
to Cleotilde Gonzalez, Carnegie Mellon University, USA.
References
Anderson, J. R., & Lebiere, C. (1998). The atomic components of thought.
Hillsdale, NJ: Lawrence Erlbaum Associates.
Dutt, V., Ahn, Y. S., & Gonzalez, C. (in press). Cyber situation awareness:
modeling detection of cyber attacks with instance-based learning
theory. Human Factors.
Dutt, V., & Gonzalez, C. (2012). Cyber Situation Awareness through InstanceBased Learning: Modeling the Security Analyst in a Cyber-Attack
Scenario. In C. Onwubiko & T. Owens (Eds.), Situational
Awareness in Computer Network Defense: Principles, Methods and
Applications (pp. 125-140). Hershey, PA: IGI Global.
Gonzalez, C., & Dutt, V. (2011). Instance-based learning: Integrating decisions
from experience in sampling and repeated choice paradigms.
Psychological Review, 118(4), 523-551. doi: 10.1037/a0024558
Gonzalez, C., Dutt, V., & Lejarraga, T. (2011). A loser can be a winner:
Comparison of two instance-based learning models in a market entry
competition. Games, 2(1), 136-162. doi: 10.3390/g2010136
341
Download