West Point 2005 - Visualization Panel Slides
Download
Report
Transcript West Point 2005 - Visualization Panel Slides
Visual Analytics for
Cyber Defense Decision-Making
Anita D’Amico, Ph.D.
Secure Decisions division of Applied Visions, Inc.
anita.damico@securedecisions. com
631-759-3909
WHAT DO CYBER
DEFENDERS DO?
HOW CAN VISUAL
ANALYTICS HELP?
2
Incident response team activities
(Killcrece, Alberts, CMU studies)
Reactive
Triggered by an event, such as an IDS alert
Examples: Reviewing log files, correlating alerts
Proactive
Prepare, protect and secure for future attacks
Examples: Prediction of upcoming attacks and techniques
Security Quality Management
IT services in support of general information security
Examples: Training, recovery planning, product evaluation
Cognitive and decision analyses show:
Very little effort on proactive
3
Visual analytics can help network defenders
transform raw data into meaning
Raw Data
Interesting Activity
Suspicious Activity
Events
Incidents
Problem Sets
4
Triage analysis
Escalation analysis
Correlation analysis
Incident response
Malware analysis
Forensic analysis
Threat analysis
Vulnerability analysis
Sensor management
Weed out false positives
Escalate suspicious activity for further analysis
Analyze
data over longer time than Triage
Incorporate multiple data sources (more than Triage)
Look for patterns and trends
Assess
similarity to related incidents – internal & external
Recommend, implement Courses of Action
Support law enforcement investigation
Reverse-engineer malware
Develop defenses against malware
Collect and preserve evidence
Support law enforcement investigation
Characterize attackers: identification, modus operandi,
motivation, location
Identify and prioritize vulnerabilities
Manage remediation of vulnerabilities
Develop signatures, tune sensors
Modify placement of sensors
(from 2005 D’Amico & Whitley CTA, and other Secure Decisions decision analyses)
5
Mission impact
analysis
6
Visualization should support all stages of SA,
types of CND analysis, and uses
Stages of Situational Awareness (SA)
Perception Comprehension Projection
Types of
Analysis
Triage,
Escalation,
Threat,
Vulnerability Correlation
Response
Forensic
Malware
ORIENT
Uses of
Visualization
attention
EXPLORE data
(for patterns, anomalies)
PREDICT
REPORT and EXPLAIN what has been observed
7
How do Alan Turner’s VA primitives apply?
Perception
Types of
Analysis
Turner’s
Primitives
Comprehension
Projection
Triage,
Escalation,
Threat,
Vulnerability Correlation
Response
Forensic
Malware
ORIENT
QUANTIFY
DISCOVER
CHARACTERIZE
TEST
8
How do cyber defenders differ from Alan’s users?
9
Old way doesn’t work, and they know it
Never feel totally successful
Hard to estimate the level of effort needed
Not clear when they’re done
CND analysts see the world in red and blue;
They attend to timing and sequence
Coordinated attack to exfiltrate email
Legend
Attacker Action
Attacker Obtains
Analyst Interpretation/Hypothesis
Analyst's View
Analyst's Action
Analyst's Wish list
Threads
Malicious exploit
Connect this activity to
scan by Foreign IP on
Day -10
Notable activities of scanned
server over past week
Response by Dest IPs
on Day -10
Noisy probe may be
visible.
Not visible to
analysts
Attack Timeline
Reconnaissance team
identifies targets,
commanders' names, e-mail
scheme
Attack team compromises
numerous hosts, both in
cooperative and noncooperative networks.
No non-public information
acquired.
Anonymity secured.
Nuisance Scan
Intruder Reconnaissance
Legitimate Scanning
Activity
Day -14
Day -13
OS Types
Email applications
Open Ports
Scan IP
address
Range
Intruder
Reconnaissance
May receive report of
compromise or
unusual activity from
DOD
Day -10
Day -9
Probe ports related to Microsoft
Exchange
Legitimate scanning
activity
Determines IP address of host
running mail service
Probe mail server
Find out what other services mail
server is running
Identify Source IP
Research History
Contact target Admin
Log Event
Automatic ID of reply
History of Source IP
Consistency of activity with
previous activity of source
Day -8
Unusual or
unexpected activity
on exploited machine
SNORT or JIDS alert
TCP Dump Data
Incident Reports
Atypical port
open on
exploited
machine
Review packet
Review log data
Eliminate irrelevant
exploits
Profile activities to infer
intent
Nuisance Scan
Noisy scan may be
apparent
May not be malicious
traffic -- may be a
legitimate discussion of
the exploit.
Day -7
Exploit Mail
Server
Administrator access to
mail server.
Vulnerability
scan might see
open FTP port
Filtering of alerts that
are irrelevant to the
target system
Data being
transferred out of
monitored network
Admin email activity
at an unusual time of
day
Open ports on
monitored
machines
Day -4
Install FTP
Server
Means for
exfiltration
Day -3
Sign in as
administrator and
access email
Email content
Day -2
Day -1
Exfiltrate email
Email content
transferred to
external system,
no longer under
control of
monitored
network.
Analysts think about data from perspective of attacker’s goals, methods, and
timing. First instance of attacker’s appearance is an important marker.
10
CYBER SECURITY
VISUAL ANALYTICS CHALLENGES
11
Incomplete, inaccurate and ephemeral data
Public Networks
Missions/ Business
Functions
Mission
-toNetwork
Mapping
Enterprise
Sensor
Location
& Status
Dynamic
Topology
Defender
Patch
Status
12
Adversaries disappear and re-appear, and can be co-located with friendlies.
Wireless networks increase transitory nature of data.
Visual analytics is an unfulfilled promise
in cyber operations
13
Failure to transition, to deliver – Lots of R&D; little
operational deployment of visual analytics systems
“Lack of information” visualization and analytics – rare
Visual interface to security automation – rare
Process visualization – rare
Visual analytics to augment training – rare
Visual analytics to evaluate tactics – rare
deliver
Visual analytics systems
imagine, create,
Data import, normalization and aggregation
Non-viz features to reduce “tool time”
Importing, filtering “hot IPs”,
authorized devices, and users
Automated report builders
Annotations and personal notes
Diverse media
Workstations, big-board,
PDA, in-vehicle displays
Robust, secure, certifiable code base
Staying ahead of the adversary
How do we use visual analytics make the cyber
defense process more proactive?
How do we enhance information sharing within an
organization, and across organizations?
Portable, shareable datasets and visual analytics
Collaborative tools
15
Mapping network assets to organizational
missions
Need information and visual analytics to discover:
16
Vulnerabilities of organization’s highest-priority
goals
Network assets that must be assured for
continuity of mission-critical functions
Organizational impact of an attack, or of a
defensive COA
Anita D’Amico
Secure Decisions division of Applied Visions, Inc.
anita.damico@securedecisions. com
631-759-3909
17