Top Banner
„Something, that is allegedly secure is not necessarily secure, Something, that is allegedly known might turn out to be unknown. Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality also limits those.“ Author: unknown Inspired by Berthold Brecht
46

„Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Jul 21, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

„Something, that is allegedly secure is not necessarily secure,

Something, that is allegedly known might turn out to be unknown. Appearance can be deceptive,

our senses can deceive us.Even though experience and knowledge

can limit errors,reality also limits those.“

Author: unknown

Inspired by Berthold Brecht

Page 2: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Michael Spranger and Dirk Labudde

Sonntag, 9. Juli 2017

Learning from the Human Immune System:

Artificial T-cells as a Response to Cyber

Attacks

Page 3: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

09.07.2017 3

Mittweida

Page 4: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

bigM - Bioinformatics

Page 5: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

FoSIL – Forensic Sciences

Page 6: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality
Page 7: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

FoSIL – Expert Opinions

Page 8: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Bioinformatics and Forensics - How today's Life Science Technologies can shape the Crime Sciences of tomorrow

forensics/it-security

Bioinformatics/Life Science

Page 9: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

The lift in the human body

intranetwww

• organism• organ• tissue• cell• organelle

Page 10: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Technical Perspective - SOA

Page 11: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

functional and structural unit

The living cell

Page 12: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

The cell and the surrounding

signaling pathway of EGF

Human Protein Reference database http://www.hprd.org

Page 13: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

A human cell and the surrounding

omnis celula e celula

infections

specific reactions immune reaction

signal transductionmetabolic pathways

Protein-protein-interactiongen regulation

Page 14: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Why does this work in a cell?

Why can we not implement this in a technical manner?

Page 15: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

How does the immune system work?

Page 16: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Transfer pathogens to people

Blood and tissue

droplet Contact

water

Page 17: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Human Immune Response System

Page 18: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

The Antigen (Virus) and Anti-body

Pattern/signatures for recognition and binding

Page 19: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Pattern recognition

Methods for information extraction

Page 20: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

What does this mean forcyber attacks?

Page 21: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Infection of „computer-networks“

Hacker hits on U.S. power and

nuclear targets spiked in 2012

Number of annual cyber attacks in

the years 2009 to 2014 (in millions)

Page 22: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Targets for critical infrastructure

Page 23: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Cyber attack

http://map.norsecorp.com/#/

Page 24: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Statistics

?

Page 25: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Types of Malware

Page 26: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Malware is similar to a software: it consists of a program code that can perform various actions when it is activated or started.

Common characteristics

In contrast to serious software, however, the unwanted code usually tries to spread unintentionally. This can be done independently or with the help of other programs / functions.

After infection, the malware continues to hide (to download program codes from the Internet, to send SPAM or to spy on personal data), or to identify itself by trying to blackmail the user, delete files, or encrypt and unwanted ones Web pages.

A computer virusregularly consists ofthree parts. • replication unit• trigger• Payload

Page 27: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Malware

• time-independent detection• Specific and adaptive antibodies • isolation

• Virus Scanner

• Real-time protection

• firewall management

• mail protection

Current security systems:

Problems: signatures too old, Adaption to slow (there is no really adaption), heuristics not good enough (minimal true positives)

Page 28: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Virus Scanner – new/old ideas

Real time scanning (continuously)• all components • random access memory• Known signatures• Algorithms for the prediction of unknown signatures (Genetic algorithms)• code scanner (emails, documents) – new software fragments (quarantine)• Automatic (semi-automatic) penetration tests

New independent components

• Information units for the whole network • Scanning of trigger units - Logical network

Page 29: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Virus Scanner – new/old ideas

New independent component

Adaption of the biological process

Page 30: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Virus Scanner – new/old ideas

New independent component

Classical Virus Scanner

Signature modulation

activation

elimination

Σ modulations

isolation

Page 31: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Simulation Grid --- Topology - spread

Topology encapsulates

Page 32: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Securing the signal transduction of the socio-technical environment: Social network (Facebook)

Example

THE INFILTRATION GAME

Artificial Immune System for the Exploitation of Crime

Relevant Information in Social Networks

Page 33: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

“Most massive attack in Leipzig since the Pogrom Night in

November 1938”

[LVZ 12th January 2016]

Introduction

Page 34: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Are we able to predict such incidents?

Yes, by monitoring of socialnetworks?

Page 35: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Rage announced and stoked by Social Networks

Page 36: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Incident Detection

0

5

10

15

20

25

30

35

40

45

0

1000

2000

3000

4000

5000

6000

Negative Comment Sentences

Negative Post Sentences

Hot Phase

Page 37: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

SoNA: A Prototype

Page 38: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Challenge – vast amount of profiles

Page 39: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Challenges – closed/secret groups

Page 40: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

This is just like pathogens, isn‘t it?

Remember, what does the human body do?

Page 41: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Human Immune Response System

Page 42: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Can we do this for socialnetworks in the same way?

Are we able to construct an artificialimmune system?

Page 43: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Agent-based Social Network Analysis

Page 44: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Artificial Immune System - Workflow

Page 45: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

Conclusion

Classical Virus Scanner

Signature modulation

activation

elimination

Σ modulations

Page 46: „Something, that is allegedly secure is not necessarily ... · Appearance can be deceptive, our senses can deceive us. Even though experience and knowledge can limit errors, reality

FEEL FREE TO ASK QUESTIONS

VISIT US AT: www.bioforscher.de/FoSIL