1 School of Information Technology and Engineering Addis Ababa University Research methodology for cyber security Applied Observational Study Team Members:1. Hirut Addis 2. Ahmed Essa 3. Thomas Getachew 4. Abay Ayalew 5. Nigussie Ashenafi Introduction 2 •Applied and observational research •Applied study types Applied observational study •Applied exploratory studies Outline •Applied descriptive studies Applied observation method selection Data collection and analysis Applied Exploratory Study: Stress test Applied Descriptive Study: Case study Reporting your results 3 Explain the differences between applied and observational studies CHAPTER OBJECTIVES Discuss how to design applied studies Walk through example using applied study methods Introduce the topic of operational bounds testing Provide a template for presenting results 4 Introduction What is applied research? Applied research includes designing, implementing, and testing systems. It is a major aspect of cyber security. What is the key difference between applied study and observational study? 5 General Definition Observational Study Observational study is the entire cyber system without injection or introduction of a change or variable from the observer. Applied Study Applied study introduces a specific change or subject that is to be evaluated. 6 Observational Vs Applied The subject of fundamental observational study is the entire cyber system without injection or introduction of a change or variable from the observer. On the other hand, applied study introduces a specific change or subject that is to be evaluated. 7 What is the key difference? Applied observational studies are likely the most common type of research conducted in the field of cyber security. The key difference between applied study and observational study is the differing scope. Applied study observes a specific subject for performance, function, security, etc. Fundamental observational study observes the entire system without presumption of behavior. 8 Applied observational study An applied study observes a new solution to understand how it performs under different conditions. Often this is a new defensive feature or system change. Most of the people assume that applied observational study is just like fundamental observational study, but not. applied observational studies are likely the most common type of research conducted in the field of cyber security. Like computer science, and allied fields, researchers in cyber security are often focused on presenting their technology, solution, algorithm, or process to the public. 9 Applied study An applied study observes a new solution to understand how it performs under different conditions. Often this is a new defensive feature or system change. Furthermore, this is accompanied by an assumption or prediction. The researcher has an expectation or unwritten assumption of how the subject should behave. A designer of an applied study seeks to understand the effect of some change or effect under observation; this often comes with an assumption of performance or behavior. 10 Applied Observational study Types there are two categories one can define applied observational study, The applied version of an observational study includes: Applied exploratory and Descriptive studies. Note:-The research done using this Chapter can help inform and improve future foundational and applied research and development 11 Applied exploratory research It is the process of observing and studying how an engineered system behaves in different situations. This kind of study can introduce a specific change or subject that is to be evaluated. Studies include sensitivity analysis and operational bounds testing such as load, performance, and stress testing. We will use an example of a new anomaly-based intrusion detection system to demonstrate the concepts of applied exploratory studies. 12 Applied exploratory research… Operational Bounds Testing: The objective of this type of applied observational study is to explore the boundary conditions, limits, and extremes of an observed cyber system. Stress testing: Evaluates how to what extent a system can perform at extremes. Performance analysis: Evaluates how well system behavior conforms to expectations. Load testing: Evaluates the system or processes as maximum expected load 13 Applied exploratory research… One of the example is sensitivity analysis Sensitivity Analysis: The objective of sensitivity analysis is to study and understand the scope, variability, and limitations of the system based on changes to the inputs. • It is the study of how precisely the outputs of a system are correlated to the inputs of the system. • Or mathematically, how the uncertainty in the outputs can be related to the inputs. classical stress testing of performance, for example read/ write speed, communication latency, or cryptographic performance or password response times are another examples of applied exploratory study 14 Applied exploratory research … The inclusion of any sort of controls or dependent and independent variables would make this an experiment, quasi experiment, or applied experimental. Does it solve the problem better than before? and Is it cheaper, faster, ‘better?’ These sorts of questions can be addressed with an applied descriptive study. This sort of research should also be sure to describe any adverse, negative, or unintended consequences. 15 Applied descriptive research It is more focused on a specific subject under test. Often focus more on an individual subject or more specialized target subject. Examples of this type of applied study include case studies, elicitation studies, and case reports. Applied descriptive studies observes how application of knowledge, process, or a system work in a real setting. 16 Applied Observation Method Selection Operational bounds testing and applied descriptive studies have different objectives. Operational bounds testing are techniques that are good for exploring if you have developed or selected the right solution based on your believed requirements. • The area of operational bounds testing is fairly self-explanatory. • The objective of this type of applied observational study is to explore the Applied Study boundary conditions, limits, and extremes of an observed cyber system. 17 Operational bounds testing… For example, • how accurate is a system or process? • How long does it take to conduct a task? • What type of performance is possible under different conditions? • This is often related to resource utilization? Applied Descriptive studies on the other hand are good for documenting how you operationally integrated a new solution into a real-world environment and what you learned. Note:- With applied research, we will explain how affective knowledge is applied to solve a problem and explore measuring the performance of some system or event. This is the key focus of applied studies. 18 Data Collection and Analysis Applied Exploratory Studies Data from operational bounds testing will be either collected or generated around specific test conditions. If it is for stress testing then a large amount of data will be generated or if t is load testing you may collect data from a real environment. For example in sensitivity analysis, the purpose is to evaluate extreme conditions. For those types of study, the goal is pass or fail criteria and minimum thresholds for different performance variables. 19 Data Collection and Analysis Continued… For General sensitivity analysis, using graphical methods is helpful. In addition to visualizing results, the Receiver operator characteristic (ROC) curve is a sensitivity analysis technique well suited to large categories of cyber security solutions. Data collected from descriptive studies will largely fall into qualitative categories. This includes interviews, surveys, stream of thought journals, and so on. 20 Data Collection and Analysis Continued… Applied Descriptive Studies Issues with bias and sampling can inadvertently influence and even ruin the results of an applied observational study. Applied observational research will still use the same statistical techniques to make sense of the data collected. Approaches such as regression testing and statistical tests such as the T-test will be applied. 21 APPLIED EXPLORATORY STUDY: STRESS TEST Scenario: Let’s posit that you are a part of a larger research team working on Internet of Things (IOT) and mobile applications, for first responders and emergency response. The team has come up with a new communication application that enables peer-to-peer communication, without hierarchical infrastructure (which would often be down in times of disaster). The team wanted to make sure that the communication is as secure as possible. The problem is that the cryptographic tools used could be power hungry, which might unreasonably drain the battery and burden the end user. 22 Applied Exploratory Study: Stress Test… We will divide the study design into three categories, the system, the behavior, and the testing methodology. System, Behavior and testing Methodology. System: The first part of the study that needed to be defined is the system under test itself. Behavior: Next, we will need to define the behavior to be studied. Since the software in question secures communication, and because radio frequency (RF) transmission is typically the greatest consumption of energy, we will scope the focus to evaluate at the extreme level of communication. Testing Methodology 23 • Finally, the last piece of the study is the testing methodology itself. • We have several host-based testing tools that evaluate system battery consumption of mobile devices, but the problem is that those tools themselves run on the device. • There is concern that the collecting of battery consumption telemetry will inadvertently affect the results using a host-based tool. • Initial tests were run with this approach, but for this study direct evaluation of battery status will be used (via wired hardware taps). • Initially all 10 devices were going to be used in the test, but because stress testing might inadvertently damage the hardware, we will pare this back to 3 baseline and 3 study devices 24 Testing Methodology… The specification of these batteries state 500 cycles before 80% of their original capacity. Open literature seems to indicate numbers ranging from 400 to 1000 cycles. we first will establish baseline behavior on all six batteries. At each test we will measure: the capacity (Ah), state of charge (to get our % battery), depth of discharge (%), open-circuit voltage (V), and time elapsed. (Note: baseline tests are not needed for stress testing, but the researcher wanted to ensure that no bad lemons (hardware failures) affect the results of the stress testing). 25 Testing Methodology... • Now for our performance and baseline runs we will additionally measure the number of bytes transmitted. • We intend to run both the baseline systems (without the secure communication application) and the test systems through 30 cycles. • Again this is a double stress test, evaluating the devices without the new secure communication software and with it installed. • This is two simultaneous stress tests. • We will then collect the data to determine if that is sufficient for analysis, before performing more tests. 26 Testing Methodology… • The first 3 phones were programed to perform full bandwidth transmission until the battery hit 75%, 50%, and 25%, then the capacity (Ah), state of charge (to get our % battery), depth of discharge (%), open-circuit voltage (V), time, and number of bytes transmitted are recorded. • Similarly, the test devices were evaluated using the exact same protocol. • 30 cycles later we collected sufficient information to conduct our statistical analysis. • We used a T-test to compare the two datasets. • After conducting another 30 runs, we got consistent results. Essentially, we are blasting an extreme amount of traffic to both systems to ensure that we push the performance to limit. 27 Testing Methodology… The final test was to determine the impact on the entire lifecycle of the device to determine if it held out for large numbers. The test was again conducted, but this time for 100 battery cycles. This was done four times to determine if more than 400 charge and discharge cycles would have an considerable effect on the consumption and drain of the ad-hoc communication software. This sort of testing is used to evaluate the speed, consumption, utilization, and general performance of systems. 28 APPLIED DESCRIPTIVE STUDY: CASE STUDY • case study. Imagine we have the same research team that has developed a new secure communication tool for First Responder mobile devices. • Stress testing has been conducted to understand how the system performs in laboratory conditions, and extreme use cases. • But now we want to study how real users will use the phone. • Our plan is to conduct two phases of a study. • We will initially conduct “An applied study on the effectiveness of a new secure ad-hoc communications protocol for first responders.” 29 APPLIED DESCRIPTIVE STUDY: CASE STUDY… • First, we will provide the devices to first responders and ask them to use it for their regular work phone. • We will work with each subject to ensure that their typical applications and functionality is available. We will then conduct interviews every month to determine how the system performs for four months. (1) perceived decrease in performance or functionality (2) any increased functionality (when traditional service was unavailable but secure neighborhood area networking was available) and (3) any user feedback to help improve the system 30 APPLIED DESCRIPTIVE STUDY: CASE STUDY… • Second, the subjects are briefed on the context and importance of their reporting. • Third, the questions were designed to limit the subjectivity as much as possible. Specific quantitative terms, ordinal values, and short answer questions were designed to eliminate ambiguity and help address subjectiveness in the answerer. • And finally, the duration is sufficiently long enough to eliminate any short-term preferential biases. Efforts like this can often go for 6 to 12 months with check in points. 31 APPLIED DESCRIPTIVE STUDY: CASE STUDY… • We first solicit volunteer participants from the fire and police departments. After collecting feedback, we were able to identify 22 police officers and 20 fire and emergency service members who would like to participate. • First month is begun, the staff are asked to use their phones as they would with their normal work phone. • After one month, questionnaires with preapproved questions were distributed to the 42 participants. • The final interview was in person again. The users were asked the same battery of questions addressing goals 1 and 2, but they were also given the chance to have open-ended responses. 32 APPLIED DESCRIPTIVE STUDY: CASE STUDY… • Phase two would be an intense case study in mock disaster conditions, coinciding with a regional exercise to test the secure communications in disaster-like environments. • The approach taken makes this a case study, the fact that a specific tool or method was added to the environment makes it applied research. 33 REPORTING YOUR RESULTS • The final important step of an applied observational study is reporting your results. • This is, however, another area where the process for applied observational research might differ from foundational observational research. • Specifically, contract research is conducted on the request of the sponsor organization, unlike grant-funded research, which is conducted in the public interest. • Not to complicate things, any government might use a contract to fund research in the public interest, but it is important to realize the difference. • Any research should have a broad understanding of how their research is being paid for and what expectations are placed upon the researchers. 34 REPORTING YOUR RESULTS… The final important step of an applied observational study is reporting your results. Title, Future Work, Abstract, Conclusion, Introduction, Acknowledgments and Methods, References Results and discussion, 35 Thank you!!!