Culture and Cyber Behaviors Dr. Char Sample csample@cert.org © 2012 Carnegie Mellon University Culture & Thought Is there common framework for examining Cyber Behaviors? Is it possible that attackers (and others) unwittingly leave behind traces? If so, can we learn anything from these traces? 1 Culture & Thought Thought processes are culturally restrained. Bargh & Morsella, 2008, Hofstede, Hofstede & Minkov 2010 Culture can be thought of as “software of the mind” Hofstede et al., 2010 If minds are programmed to think in certain patterns, why would cyber patterns be exempt? Can “patterns of thought” be characterized? Can we tap into these “patterns of thought”? If we understand these patterns of thought and can we influence them? 2 What is Culture? Definition: “The collective mental programming of the human mind that distinguishes one group of people from another”. Hofstede, Hofstede & Minkov, 2010. How is culture learned? Family Education System Society 3 Relationship between Culture and Psychology 4 How This Research Differs from Profiling Profiling works in a similar manner to “signatures” Attacker TTPs are collected and ordered. When the attacks match (“correlate”) the TTP attribution occurs. This research examines attack behaviors within Hofstede’s cultural framework. Attacks are collected and are examined by cultural dimensional values, quantitatively. Correlations are statistical correlations NOT pattern matches. 5 Purpose Statement Quantitatively determine if a relationship exists between culture and Cyber behaviors. • Use existing data for test and control groups. • Data is also publicly available. 6 Cultural Dimensions 4 cultural dimensions: • Power distance (pdi 11-104) • Individualism vs Collectivism (ivc 6-91) • Masculine vs feminine (m/f 5-110 ) • Uncertainty avoidance (uai 8 -112) 2 additional dimensions were added • Long Term Orientation( vs Short Term Orientation (ltovsto 0 - 100). Bond, 1980. • Indulgence vs restraint (ivr 0 - 100). Minkov 7 Issues, Concerns, Caveats Issues, concerns, caveats, etc. • “The study of culture and decision making is a relatively new and unexplored field.” Guss, 2004 • Must guard against stereotypes. • Hofstede’s work is not as precise as some would like but it does offer quantifiable data that is periodically updated. • Even the obvious, must be supported by data. Criticisms of Hofstede’s work • Participants are all engineers • As a measurement tool, the values are too rough Measures nations, groups within nations exists • 8 STUDIES Explained STUDY 1 Inferential study to determine if a relationship exists between any cultural dimension and nationalistic, patriotic themed website defacements(NPTWDs). STUDY 2 Correlational study to determine if the number of NPTWDs correlates with high PDI values, or any other dimension. STUDY 3 Correlational study to determine if social network adoption rates correlates with any cultural dimension. 9 Study 1 Hypothesis Hypothesis: There is no relationship between cultural values and NPTWDs. — H0 There is no relationship between culture and NPTWDs . — H1-6 A relationship exists between culture and NPTWDs. Data Collection • Nominal scoring: — Qualitative studies provided input. — Country is scored if verified evidence exists that shows that the country participated NPTWDs. • Collected data on the following countries: — Bangladesh, China, India, Indonesia, Iran, Israel*, Malaysia, Pakistan, Philippines, Portugal, Russia, Singapore, Taiwan, and Turkey. (Columbia, Brazil, and Morocco were dropped due to lack of verifying studies or reports in English.) Means tested the results for each dimension 10 Study 1 Results – PDI (Useable Data) 100-109 90-99 80-89 70-79 60-69 50-59 40-49 4 3 2 1 0 30-39 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 8 6 4 2 0 Actual PDI Results 20-29 Hofstede PDI Distribution Attack Data* ( 2.8% - 1.8% ) 10-19 Control Data 11 Study 1 Results – IVC (Useable Data) Control Data Attack Data ( 1.5% – 1.0% ) Actual IVC Results 6 Hofstede IVC Distribution 5 4 3 2 1 0 5 4 3 2 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 0 0-9 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 1 12 Study 1 Results – IVR (Useable Data) Control Data Hofstede IVR Distribution Attack Data Actual IVR Results 6 5 5 4 4 3 3 2 2 1 1 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 0 0-9 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 0 13 Study 1 Results – UAI (Useable Data) Control Data Sample Data Actual UAI Scores 6 4 2 0 3.5 3 2.5 2 1.5 1 0.5 0 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 110-119 Hofstede UAI Distribution 14 Study 2 RESULTS 15 Study 2 Research Plan Observational, correlational study that compares the number of NPTWDs against cultural dimension scores in order to determine, through observation, if a correlation exists. Data Collection – 2 months worth of attacks at http://www.zone-h.org H0: There is no statistical relationship between culture and NPTWDs. H1: A statistical relationship exists between culture and NPTWDs. 16 Study 2 Results – PDI Control Data Attack Data (1.8%) Hofstede Distribution Actual Attack Distribution ( r = 0.681 ) 7 6 600 5 500 4 400 3 2 1 0 300 200 100 0 17 Study 1 Results – IVC Control Data Attack Data (9.0%) Hofstede IVC Distribution 5 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 Actual Attack Distribution ( r = -0.666 ) 800 700 600 500 400 300 200 100 0 18 Study 2 LTOvSTO Results Actual Attack Distribution 3.2% Hofstede Distribution 4.5 ( r = -0.633 ) 8 4 3.5 7 3 6 2.5 5 2 4 1.5 3 1 2 0.5 0 1 0 19 Study 2 – Correlational Results 20 Study 3 RESULTS 21 Study 3 Research Plan Observational, correlational study that compares the adoption rate of FB, LinkedIn and Twitter against cultural dimension scores in order to determine, through observation, if a correlation exists. Data Collection –Most recent results at http://www.internetworldstats.com H0: There is no statistical relationship between culture and social networking adoption rates. H1: A statistical relationship exists between culture and social networking adoption rates. 22 Study 3 Results PDI – FB, LinkedIn & Twitter Facebook Rates LinkedIn Rates ( r = -0.2364) ( r = -0.73) 100 90 80 70 60 50 40 30 20 10 0 30 25 20 15 10 5 0 Hofstede Distribution 20 18 16 14 12 10 8 6 4 2 0 Twitter Countries 6 5 4 3 2 1 0 23 Study 3 Results IVC – FB, LinkedIn & Twitter Facebook LinkedIn ( r = -0.503) 90 80 70 60 50 40 30 20 10 0 ( r = 0.3939) 35 30 25 20 15 10 5 0 Hofstede - Distribution Twitter Countries 14 12 10 8 6 4 2 0 7 6 5 4 3 2 1 0 24 Study 3 Results M/F – FB, LinkedIn & Twitter Facebook LinkedIn ( r = -0.7) ( r = -0.8636) 100 25 20 15 10 5 0 80 60 40 20 0 Hofstede Distribution 25 20 15 Twitter Countries 12 10 8 6 10 4 5 2 0 0 25 Study 3 Results UAI – FB, LinkedIn & Twitter LinkedIn Facebook ( r = -0.2727 ) ( r = -0.2 ) 35 30 25 20 15 10 5 0 90 80 70 60 50 40 30 20 10 0 Hofstede Distribution 20 15 10 5 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 >100 0 Twitter Countries 9 8 7 6 5 4 3 2 1 0 26 Study 3 Results LTOvSTO – FB, LinkedIn & Twitter Facebook LinkedIn ( r = -0.1818 ) ( r = -0.2818 ) 70 60 50 40 30 20 10 0 25 20 15 10 5 0 Hofstede Distribution 18 16 14 12 10 8 6 4 2 0 Twitter Countries 9 8 7 6 5 4 3 2 1 0 27 Study 3 Results IVR – FB, LinkedIn & Twitter LinkedIn ( r = 0.6909 ) Facebook ( r = 0.5364) 30 100 25 80 20 60 15 40 10 20 5 0 0 Hofstede Distribution 18 16 14 12 10 8 6 4 2 0 Twitter Countries 9 8 7 6 5 4 3 2 1 0 28 Anecdotes Things That Make You Say Hmmmm? 29 Anecdotal Support DNS fast flux registrations report. Konte, Feamster, & Jung 2008 Top 10 countries by number IPs Listed 3 activities A record advertising NS record record advertising Spamvertising 30 Anecdotal Support – A Record Dimension r Evaluation (Cohen) PDI 0.1534 Weak IVC -0.1169 Weak M/F 0.1716 Weak UAI 0.2838 Weak LTOvSTO 0.5816 Strong IVR -0.3369 Moderate 31 Anecdotal Support – NS Record Dimension r Evaluation (Cohen) PDI 0.3252 Moderate IVC -0.2516 Weak MF 0.2002 Weak UAI 0.1768 Weak LTOvSTO 0.6097 Strong IVR -0.3295 Moderate 32 Anecdotal Support – Spamvertising Dimension PDI r 0.8605 Evaluation (Cohen) Strong IVC -0.226 Weak MF 0.096 None UAI 0.4363 Moderate LTOvSTO 0.0204 None IVR -0.0636 None 33 Anecdotal UAI Example(s) Flame’s collision (probabilistic) – US(46) low UAI Precision of Stuxnet – Israel high UAI (81) Brute Force attacks – Bank fraud investigator T. Trusty’s talk: Romania (90), Russia (95), Spain (86), Mexico (82) and Italy (75) 34 Why do we care? “So what!” Attribution assistance, potential forensics tool. Understanding “patterns of thought” may point to “patterns of weaknesses”. If we can apply to software: We can provide insight into coding “blind spots”. We can target attacks based on attacker cultural “blind spots”. Persona development based on culture. 35 Summary “This dominance of technology over culture is an illusion. The software of the machines may be globalized, but the software of the minds that use them is not” (Hofstede, Hofstede & Minkov, 2010) 36 Conclusions This line of research holds significant promise. Results are promising Extensibility of the framework needs further testing. Further investigation is needed. PDI & IVC have shown results in all studies. Activity in additional dimensions suggests the need for additional studies with questions focused on dimensional behaviors. Even the lack of activity on dimensional poles is significant but requires further investigation. 37 Future Research Correlational study of defacements and level of aggression Correlational study of defacements and kinetic activity Examination of fast flux behaviors. Studies can be broken down by users & creators. Numerous studies on UAI and attack preferences. Numerous studies on UAI, PDI, IVR and coding preferences. Numerous studies on IVR and attack preferences. 38 Thank you! Dr. Char Sample © 2012 Carnegie Mellon University References Baumeister, R.F., and Masicampo, E.J., (2010) “Conscious Thought is for Facilitating Social and Cultural Interactions: How Mental Simulations Serve the Animal-Culture Interface”, Psychological Review, Volume 117, No. 5, pp. 945-971. Buchtel, E.E. and Norenzayan, A., (2008). “Which Should You Use, Intuition or Logic? Cultural Differences in Injunctive Norms About Reasoning”, Asian Journal of Social Psychology, Volume II No.4, pp. 264-273. doi:10.1111/j.1467_839x.2008.00266.x. Cohen, J. (1988). Statistical Power Analysis for the Behavioral Sciences 2nd Edition, Lawrence Erlbaum Associates, Publishers: New York, NY. Evans, J.S.B.T. (2008). Dual-processing Accounts of Reasoning, Judgement and Social Cognition, Annual Review Psychology, Volume 59, pp. 255-278, doi: 10.1146/annurev.psych.59.103006.093629. Geert-hofstede website (2013). Retrieved from http://www.geert-hofstede.com. Guess, C.D. (2004). “Decision Making in Individualistic and Collectivist Cultures”, Online Readings in Psychology and Culture, Volume 4, Retrieved from http://scholarworks.gvsu.edu/orpc/vol4/issl/3 Guss, C.D. and Dorner, D. (2011), “Cultural Differences in Dynamic Decision-Making Strategies in a Non-linear, Time-delayed Task”, Cognitive Systems Research, Volume 12, No.3, pp. 365-376 Retrieved from http://dx.doi.org/10.1016/j.cogsys.2010.12.003 40 References Hofstede, G., Hofstede, G.J., and Minkov, M. (2010). Cultures and Organizations, McGraw-Hill Publishing: New York, NY. Internet World Stats website (2014). Retrieved from http://www.internetworldstats.com Konte, M., Feamster, N. and Jung, J. (2008). Fast flux service networks: Dynamics and roles in hosting online scams. ACM Internet Measurements Conference. Retrieved from Georgia Tech on October 16, 2012. Minkov, M. (2013). Cross-cultural Analysis, Sage Publications: Thousand Oaks, CA. Minkov, M. (2011) Cultural differences in a globalizing world. WA, UK: Emerald Group Publishing Limited. Nakashima, E., Miller, G., and Tate, J. (2012, June 19). U.S., Israel developed flame computer virus t slow Iranian nuclear efforts, officials say. The Washington Post. Sample, C. (2013). “Applicability of Cultural Markers in Computer Network Attack Attribution”, Proceedings of the 12th European Conference on Information Warfare and Security, University of Jyvaskyla, Finland, July 11-2, 2013, pp. 361-369. Sample, C., Karamanian, A., (2014, March). Hofstede’s Cultural Markers in Computer Network Attack Behaviours, International Conference of Cyberwar and Security (ICCWS 2014). Lafayette, Indiana March 24-25, 2014. Trusty, T., (2013, October). ‘The wit, wisdom and policies of vapidbank,”20TH International Computer Security Symposium and 5th SABSA World Congress, September 29-October 3, 2013, Naas, Ireland. 41 References Woo, H.,J., Kim and Dominick, J. (2004). “Hackers: Militants or merry pranksters? A content analysis defaced web pages. Media Psychology, 6, 63-82. Zone-h website (2013). Retrieved from http://www.zone-h.org. 42 Back-up slides © 2012 Carnegie Mellon University Tom Trusty’s Talk Brute force (exhaust all possibilities.. High UAI?) • Romania: 90, 30, 42, 90, 52, 20 • Spain: 57, 51, 42, 86, 48, 44 • Mexico: 81, 30, 69, 82, 24, 97 • Italy: 50, 76, 70, 75, 61, 30 44 Indulgence vs Restraint UK pdi 35 idv 89 m/f 66 ua 35 ltovssto 51 ivr 69 US pdi 40 idv 91 m/f 62 ua46 ltovssto 26 ivr 68 45 Hypothesis Study 1 H0: There is no statistical relationship between culture and NPTWDs. H1-6: A statistical relationship exists between culture and NPTWDs. 46 Study 2 Builds on previous research. Sample, 2013. Follow-on study moves from inferential to correlational. Determine if a correlation exists between number of NPTWDs and culture. 47 Hypothesis Study 2 H0: There is no statistical relationship between culture and NPTWDs. H1: A statistical relationship exists between culture and NPTWDs. H2: There is no correlation between NPTWDs and PDI or any other cultural dimension. H3: There is a correlation between NPTWDs and PDI or any other cultural dimension. 48 Variables Independent variable • Culture • Six dimensions defined by Hofstede et al. (2010) — PDI (11-104) — IVC (6-91) — M/F (5-110) — UAI (8-112) — LTO — IVR (0-100) (0-100) Dependent variable: NPTWDs. 49 Results – PDI (Useable Data) PDI With Israel 10 9 8 7 6 5 4 3 2 1 0 low pdi neutral high pdi PDI Without Israel 10 9 8 7 6 5 4 3 2 1 0 low pdi neutral high pdi 50 Results – All Data PDI PDI With Israel PDI Without Israel 10 10 9 9 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 0 low 0 low neutral neutral high high 51 Results – IVR (Useable Data) • Data for this dimension characteristics • Z Test Results z: 0.0307 • Mann-Whitney Results: 0.0655 Sample Data IVR Scores 8 7 6 5 4 3 2 1 0 Restrained Neutral Indulgent 52 Results - UAI All Data Control Data Actual Results All Data Control Group UAI UAI All Data 27.5 9 27 8 26.5 7 6 26 5 25.5 4 3 25 2 24.5 1 24 0 low uai neutral high uai low uai neutral high uai 53 Study 1 Results Peer Reviewed Data - Il Results of Question One Test Without Israel _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.42 0.0078 Reject (IVC) H10, H12 μ >= 45 Mann-Whitney -2.35 0.0094 Reject (M/F) H10, H13 μ >= 50 Mann-Whitney 0.5714 0.4247 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney -1.33 0.0918 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney 1.15 0.1251 Accept (IVR) H10, H16 μ >= 45 Mann-Whitney -1.51 0.0655 Accept _______________________________________________________________________ 54 Study 1 Results All Data - Il Results of Research Question One Tests without Israel _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.54 0.0055 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.45 0.0071 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney - 0.19 0.4247 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney 1.04 0.1492 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney -0.35 0.3632 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney 0.74 0.2297 Accept _______________________________________________________________________ 55 Results – PDI (Useable Data – IL) Control Data Attack Data Hofstede PDI Distribution 7 6 5 4 3 2 1 0 Actual PDI Results without Israel 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 100-109 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 4 3 2 1 0 56 Control Data Hofstede PDI Distribution 8 6 4 2 0 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 110-119 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 Results – PDI (All Data – Il) Attack Data PDI All Data - Israel 5 4 3 2 1 0 57 Results IVC (All Data - Il) Control Group Actual Results IVC All Data - Il IVC - Israel 6 Hofstede IVC Distribution 5 4 3 2 1 0 5 4 3 2 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 1 0 58 Results – UAI (Useable Data) Hofstede UAI Distribution 6 5 4 3 2 1 0 Sample Data Actual UAI Results Without Israel 4 3 3 2 2 1 1 0 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 110-119 Control Data 59 Results – IVC (Useable Data) Control Data Hofstede IVC Distribution Attack Data Actual IVC Results without Israel 6 5 5 4 3 2 1 0 4 3 2 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 0 0-9 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 1 60 Standard CERT Disclaimer NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN “AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free governmentpurpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. 61 Study 1 Results – All Data Results of Research Question One Tests _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.08 0.0188 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.3 0.0107 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney 0.16 0.4364 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney 0.9 0.1841 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney -0.31 0.3783 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney 0.74 0.2297 Accept _______________________________________________________________________ 62 Control Data Hofstede PDI Distribution 8 6 4 2 0 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 Study 1 Results – PDI All Data Attack Data PDI All Data 5 4 3 2 1 0 63 Study 1 Results IVC (All Data) Control Group Actual Results IVC All Data IVC Hofstede IVC Distribution 5 4 3 2 1 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 0 6 5 4 3 2 1 0 64 Study 1 Results – Peer Reviewed Data Results of Research Question One Tests _______________________________________________________________________ Hypothesis # Test Tool Z(u) p(u) Z(a) p(a) Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 1.91 0.0281 2.08 0.0188 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.17 0.015 -2.3 0.0107 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney 0.5753 0.4247 0.16 0.4364 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney -1.16 0.123 0.9 0.1841 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney 1.15 0.1251 -0.31 0.3783 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney -1.51 0.0655 0.74 0.2297 Accept _______________________________________________________________________ 65