Academic Perspectives on Cybersecurity Victimization and Research Stephen Burd ()

advertisement
Academic Perspectives on
Cybersecurity Victimization and Research
Stephen Burd (burd@unm.edu)
UNM Information Assurance Scholarship for Service Program
UNM Center for Information Assurance Research & Education
Presentation copies available online
http://averia.unm.edu
Last revised: 7/17/2016 3:38 AM
Introducing the Players
Arief & Adzmi, Understanding Cybercrime from Its Stakeholder’s Perspectives:
Part 2 – Defenders and Victims, IEEE Security & Privacy, March/April 2015
Victim Characteristics
Arief & Adzmi, Understanding Cybercrime from Its Stakeholder’s Perspectives:
Part 2 – Defenders and Victims, IEEE Security & Privacy, March/April 2015
One Research Thread

Individual phishing victims focusing on their
behavior and cognition
 Context
Who targets them?
 For what purpose?
 How are they targeted?

 What makes them vulnerable?
Online and related behaviors
 Cognitive models and processes

 How can their vulnerabilities be mitigated?
Education and training
 Designing systems to match cognitive models/processes
 Technology-assisted risk awareness

A Cognitive Processing Model
M. Metzger, Making Sense of
Credibility on the Web: Models for
Evaluating Online Information and
Recommendations for Future
Research, Journal of The American
Society for Information Science and
Technology, volume 58:13 (2007),
pp. 2078–2091.

Dual-processing model of Web site credibility assessment:
 Dual processing is drawn from research in social psychology
 Posits two modes of human information processing:


Heuristic – Quick snap judgement using informal rules/clues
Systematic – Slower careful analysis with possible follow-up research
 Choice of processing mode influenced by motivation and ability
Long-Term Research Program

Test and validate the model – Does it accurately describe user behavior
in phishing scenarios?
 Evidence to date suggests yes
 Limitations – small sample experiments using undergraduate Guinea Pigs

Develop strategies to employ the model in ways that avoid or mitigate
individual vulnerability, e.g.,
 Preprocess content and provide subtle or overt cues to warn of high risk
 Define a phishing training program based on training supplemented by posttraining fake “traps”

Empirically test each strategy and measure the results
 Build related software, embed in an ordinary browser, do a large sample A/B test
and measure successful phishes and their consequences for both groups
 Run the training/trap program as an A/B test, measure results and compare
across groups or over time – Is the behavioral impact real? Does it fade?
 In either case, does systematic processing increase and does that result in fewer
adverse phishing outcomes?

Strategy development and empirical testing are typically described in a
“Future Research Directions” section of a model testing/validation paper
 How often are the next steps actually taken?
Academic Motivation for the Research
Program

What motivates academic researchers?
 Promotion/tenure, based on
Number/quality of publications
 Number of mentored research-oriented graduate students
 Grant $

 Money
Direct compensation – e.g., summer salary
 Indirect compensation – e.g., equipment and travel funds
 Grants that cover other research costs – e.g., graduate student
salaries, software licenses, survey/experiment costs, …

 Prestige – Do my colleagues, chair, and dean value
what I’m doing?
Research Realities/Impediments

Model development and testing is easy to publish
 Clear line of development from others’ work
 Low cost of experimentation
 Clear standards of quality – easier to target an “A” journal

Developing ways to put the model into practice
 This is perceived as a design and engineering task
 Generally hard to publish until empirically tested

Empirically testing




Relatively high cost of experimentation
Difficult access to real-world data and testing environments
Clearance to publish can be tough to obtain
Less clear standards of quality combined with shorter-term
engineering perspective – harder to target an “A” journal
Critical Research Impediment
Access to Data and Other Resources

“… both chambers are expected to consider a
major cybersecurity bill designed to encourage
private companies to share data with each other,
the Department of Homeland Security and,
through the department, ultimately the nation’s
intelligence agencies. But past efforts have
faltered on the issue of liability protection for
the firms. Such legislation is desired by the White
House, which views information sharing by
private industry as critical to detecting and
deterring threats.” – NY Times, 4/14/2015
Some Recommendations

Target an appropriate portion of research funds to
the kinds of research that produce practical “fieldtested” results

Ask journal editors and editorial boards to more
highly value research beyond model testing and
validation

Provide researchers (and their students) with
access to existing data

Provide researchers (and their students) with test
beds for experimentation
UNM’s Human Centric Security Initiative

The Human-Centric Security (HuCS) Initiative is a
collaborative effort between UNM’s





Department of Computer Science
Department of Electrical and Computer Engineering
Anderson School of Management
Sandia National Laboratories
Goals:
 Establish a problem-driven agenda for cutting-edge,
human-centric research
 Educate the next generation of ethical hackers
 Facilitate technology transfer to benefit society
UNM Cybersecurity/IA Faculty
Rich Brody
Fraud, forensic accounting
Stephen Burd
IA education, behavioral modeling
Jed Crandall
Privacy, digital forensics, Internet surveillance
Michalis Faloutsos
Network security
Stephanie Forrest
Biological methods in cybersecurity
Greg Heileman
Information security, digital rights management
Xin Luo
Behavioral modeling, financial fraud
Alex Seazzu
Digital forensics, IA education
Download