Top Banner
Session ID: Session Classification: Michele Chubirka Transaction Network Services/ Packetpushers.net MASHF41A Intermediate THIN SLICING A BLACK SWAN: A SEARCH FOR THE UNKNOWNS
19

RSA Security Conference 2013: Thin Slicing a Black Swan

Jan 23, 2015

Download

Technology

As infosec professionals we are swimming in prodigious amounts of data, but it isn’t making us better at our jobs, it seems to make us worse. In Verizon’s 2012 Data Breach Investigations Report, it was found that across organizations, an external party discovers 92% of breaches. We continue to desperately grasp at that straw of, “more data,” but what if this is simply information gluttony? Incident response's bloated model drives it closer to a form of security archeology rather than its promise of real-time relevance.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RSA Security Conference 2013: Thin Slicing a Black Swan

Session ID:

Session Classification:

Michele Chubirka Transaction Network Services/Packetpushers.net

MASH-­‐F41A  

Intermediate  

THIN SLICING A BLACK SWAN: A SEARCH FOR THE UNKNOWNS

Page 2: RSA Security Conference 2013: Thin Slicing a Black Swan

In Verizon’s 2012 Data Breach Investigations Report, it was found that across organizations, an external party discovers 92% of breaches.

Something’s Broken

Page 3: RSA Security Conference 2013: Thin Slicing a Black Swan

From Compromise To Discovery

►  We believe we can solve the issue of the unknowns, intrusions, with more data.

►  The more information we have, the less we know. ►  This makes us no better than security archeologists.

Page 4: RSA Security Conference 2013: Thin Slicing a Black Swan

►  An unknown unknown. ►  Can’t be predicted by

probability theories. ►  Rationalized after the fact. ►  How often do we try to

predict the Black Swan Event in security and fail?

The Black Swan Event

Page 5: RSA Security Conference 2013: Thin Slicing a Black Swan

“Military drone operators amass untold amounts of data that never is fully analyzed because it is simply too much.” Michael W. Isherwood, defense analyst and former Air Force fighter pilot.

Information Gluttony?

Page 6: RSA Security Conference 2013: Thin Slicing a Black Swan

•  From beginning of recorded time to 2003 - five exabytes of information.

•  2011 - that much created every two days. •  2012 - prediction is every 10 minutes.

Digital Kudzu

Page 7: RSA Security Conference 2013: Thin Slicing a Black Swan

►  SIEMs: never gets fully implemented. ►  Predictions using Logistic Regression/Bayesian

Probability. ►  Huge amounts of data, not enough time. ►  “Open world” problem using “closed world” assumptions. ►  More staff, more money.

Current Solutions

Page 8: RSA Security Conference 2013: Thin Slicing a Black Swan

“…the ability of our unconscious to find patterns in situations and behavior based on very narrow slices of experience.” Malcolm Gladwell, Blink

Alternative Model: Thin Slicing

Page 9: RSA Security Conference 2013: Thin Slicing a Black Swan

►  Cook County Hospital struggled with identifying patients in danger of an imminent heart attack.

►  Coronary care unit was overwhelmed. ►  Public hospital, limited resources.

Case Study: A Hospital in Trouble

Page 10: RSA Security Conference 2013: Thin Slicing a Black Swan

►  Lee Goldman, a cardiologist, created a protocol based upon an algorithm developed in partnership with mathematicians.

►  After two years of using a decision tree, hospital staff were 70% more effective at recognizing patients at risk.

►  Less information led to greater success. ►  Technique used by first-responders every day.

Applied Thin-Slicing

Page 11: RSA Security Conference 2013: Thin Slicing a Black Swan

(1997) found that, compared with a logistic regression model thatuses eight cues simultaneously to make a decision, this FFT had ahigher overall predictive accuracy, in addition to its advantages infrugality (i.e., number of cues checked to make a diagnosis) andspeed. Moreover, its transparency means that doctors can easilyunderstand how the diagnostic system works, whereas lack oftransparency has contributed to doctors’ resistance to complexexpert systems, such as logistic regression. Medical experts rely onother FFTs as decision aids in clinical practice, such as whenperforming HIV testing (Gigerenzer, Hoffrage, & Ebert, 1998),performing mammography screening (Welch, 2004, p. 36), andprescribing antibiotics to children (Fischer et al., 2002).

FFTs are not just prescriptive but descriptive models of decisionmaking as well. Figure 4b shows an FFT that judges in Londonappear to use when deciding whether to make a punitive baildecision (i.e., imprisonment or bail with restrictions) or a nonpu-nitive one (i.e., unconditional bail). According to Dhami (2003),there are 25 cues that potentially could be used to make thisdecision. Based on 342 bail hearings by 116 judges in two Londoncourts, she found that FFTs involving only three cues both fit andpredicted the judges’ decisions better than a linear model using all25 cues. Figure 4b shows the tree for one London court (the treefor the other court is identical except for one cue). Moreover,Dhami and colleagues found that other types of legal decisionsmade by British judges are similarly well described by FFTs (e.g.,Dhami & Ayton, 2001; Dhami & Harries, 2001). Additional evi-dence for FFTs as descriptive models has been reported for deci-sions based on vignettes about whether to prescribe medication totreat depression (Smith & Gilhooly, 2006) and whether to admitchildren suffering from asthma to the hospital (Kee et al., 2003), aswell as human participants’ responses, in terms of both reactiontime and accuracy, in classic categorization tasks (Fific, Little, &Nosofsky, 2010).

Tree models of categorization and decision making have beenstudied in a variety of disciplines, such as medicine, appliedstatistics, computer science, and psychology (e.g., Breiman, Fried-man, Stone, & Olshen, 1984; Busemeyer, Weg, Barkan, Li, & Ma,2000; Green & Mehr, 1997; Quinlan, 1993). Martignon and col-leagues conceptualized FFTs as a class of simple tree models thatcategorize or make decisions with limited information search (e.g.,Martignon, Katsikopoulos, & Woike, 2008; Martignon, Vitouch,Takezawa, & Forster, 2003). Because the lines between categori-zation and decision making are often murky (Ashby & Berretty,1997), we frame FFTs in this study as decision models, highlight-ing the consequences associated with the outcomes of categoriza-tion.

In tasks where a binary decision needs to be made (e.g., imme-diate or delayed treatment as in the triage problem) and there arem cues available for making such a decision, an FFT is defined asfollows:

Definition: A fast-and-frugal tree is a decision tree that has m ! 1exits, with one exit for each of the first m " 1 cues and two exits forthe last cue.

An FFT is composed of sequentially ordered cues. To makea decision, an FFT starts by checking an object’s value on thefirst cue. If it meets the exit condition of the cue, which isgenerally framed as an if–then statement (e.g., if a person canwalk, then delayed), a decision is made and no other cues needto be checked. Otherwise, an FFT considers the other cues oneafter another until the exit condition of a cue is met. The lastcue of an FFT has two exits, to ensure that a decision will bemade in the end. Among all trees that could be constructed froma group of ordered cues, an FFT has the minimal number ofexits. In contrast, a full tree has the maximum. For the triageproblem to which START is applied (see Figure 1), a full tree

Did prosecution request conditional bail or oppose bail?

No or N.A.

Nonpunitive

Yes

Punitive

Did previous court impose conditions or remand in custody?

Yes

Punitive

Did police impose conditions or remand in custody?

Yes

Punitive

No or N.A.

No or N.A.

ST segment change?

No Yes

Coronary Care UnitChief complaint of

chest pain?

Regular Nursing Bed

No

Any other factor?(NTG, MI, ST!, ST"#, T"#)

Regular Nursing Bed

No Yes

Coronary Care Unit

Yes

a b

Figure 4. Two examples of fast-and-frugal trees (FFTs) applied to large world problems. The left tree (a) isdesigned to help emergency room doctors decide whether to send a patient with severe chest pain to the CoronaryCare Unit (CCU) or a regular nursing bed (Green & Mehr, 1997). The right tree (b) is a model of how Britishjudges decide whether to make a punitive bail decision (Dhami, 2003).

320 LUAN, SCHOOLER, AND GIGERENZER

Fast and Frugal Trees

Page 12: RSA Security Conference 2013: Thin Slicing a Black Swan

►  Semantic Web technology. ►  Queries based on relationships or mental associations. ►  Graphs treat each packet from capture file as a discrete

event with properties. ►  TCP header info in a metadata model. ►  Model replicates human cognitive economy.

Method: Resource Description Framework (RDF)

Page 13: RSA Security Conference 2013: Thin Slicing a Black Swan

►  SPARQL query language uses a concise approach for quickly traversing large data sets while capturing similarities between packets as generalizations.

►  RDF statement contains a subject, predicate and an object. ►  Subject defines the event. ►  Predicate defines a characteristic or property. ►  Object contains the value for the predicate.

Thin-Slicing with SPARQL

Page 14: RSA Security Conference 2013: Thin Slicing a Black Swan

sparql select * { ?s ?p ?o.}; sparql select *{ ?e1 <http://www.rrecktek.com/demo/src> ?ip1.};

Example: Building A Query

Page 15: RSA Security Conference 2013: Thin Slicing a Black Swan

•  All source IPs and their destination IPs. •  For each source, count how many times it went to a

destination. •  Report source destination and count. sparql SELECT ?src ?dst (count (?dst) as ?count) { ?e1 <http://www.rrecktek.com/demo/src> ?src. ?e1 <http://www.rrecktek.com/demo/dst> ?dst. } ORDER BY DESC (?count);

Example

Page 16: RSA Security Conference 2013: Thin Slicing a Black Swan

SPARQL web interface

Page 17: RSA Security Conference 2013: Thin Slicing a Black Swan

►  What we can do ►  Build strong infrastructures minimizing technical debt. ►  Add the equivalent of air bags to the architecture for when

intrusions occur. ►  Recognize signature limitations. ►  Investigate the creation of real-time fast and frugal trees. Our patient is dying on the table. It’s up to us to change the outcome.

We Can’t Fight All Unknowns

Page 18: RSA Security Conference 2013: Thin Slicing a Black Swan

►  Michele Chubirka Twitter @MrsYisWhy [email protected]

►  RDF/SPARQL contribution courtesy of Ronald P. Reck [email protected]

Thanks!

Page 19: RSA Security Conference 2013: Thin Slicing a Black Swan

"Eclectic Tech." Semantic Web Introduction. N.p., n.d. Web. 20 Dec. 2012. Erwin, Sandra I. "Too Much Information, Not Enough Intelligence." National Defense Magazine. N.p., May 2012. Web. <http://www.nationaldefense.org>. Gigerenzer, Gerd. Gut Feelings: The Intelligence of the Unconscious. New York: Viking, 2007. Print. Gladwell, Malcolm. Blink: The Power of Thinking without Thinking. New York: Little, Brown and, 2005. Print. Luan, Shenghua, Lael J. Schooler, and Gerd Gigerenzer. "A Signal-detection Analysis of Fast-and-frugal Trees." Psychological Review 118.2 (2011): 316-38. Print. Marewski, Julian N., PhD, and Gerd Gigerenzer, PhD. "Heuristic Decision Making in Medicine." Dialogues in Clinical Neuroscience 14.1 (2012): 77-89. Print. Messmer, Ellen. "SANS Warns IT Groups Fail to Focus on Logs for Security Clues." TechWorld. IDG, May 2012. Web. "RDF." -Semantic Web Standards. W3C, n.d. Web. 02 Jan. 2013. "Resource Description Framework (RDF)Model and Syntax." RDF Model and Syntax. W3C, n.d. Web. 02 Jan. 2013. Rieland, Randy. "Big Data or Too Much Information?" Innovations. Smithsonian, 7 May 2012. Web. "Semantic Web Standards." W3C. W3C, n.d. Web. 02 Jan. 2013. Taleb, Nassim. The Black Swan: The Impact of the Highly Improbable. New York: Random House, 2007. Print. Turek, Dave. "The Case Against Digital Sprawl." The Management Blog. Bloomberg Businessweek, 2 May 2012. Web. Verizon 2012 Data Breach Investigation Report. Rep. N.p.: Verizon, n.d. Print.

References