Toward an Evidence-based Design for Reactive Security Policies and Mechanisms

02/24/2018
by   Omer Katz, et al.
0

As malware, exploits, and cyber-attacks advance over time, so do the mitigation techniques available to the user. However, while attackers often abandon one form of exploitation in favor of a more lucrative one, mitigation techniques are rarely abandoned. Mitigations are rarely retired or disabled since proving they have outlived their usefulness is often impossible. As a result, performance overheads, maintenance costs, and false positive rates induced by the different mitigations accumulate, culminating in an outdated, inefficient, and costly security solution. We advocate for a new kind of tunable framework on which to base security mechanisms. This new framework enables a more reactive approach to security allowing us to optimize the deployment of security mechanisms based on the current state of attacks. Based on actual evidence of exploitation collected from the field, our framework can choose which mechanisms to enable/disable so that we can minimize the overall costs and false positive rates while maintaining a satisfactory level of security in the system. We use real-world Snort signatures to simulate the benefits of reactively disabling signatures when no evidence of exploitation is observed and compare them to the costs of the current state of deployment. Additionally, we evaluate the responsiveness of our framework and show that in case disabling a security mechanism triggers a reappearance of an attack we can respond in time to prevent mass exploitation. Through large-scale simulations that use integer linear and Bayesian solvers, we discover that our responsive strategy is both computationally affordable and results in significant reductions in false positives ( 20 about 9 years long), at the cost of introducing a moderate number of false negatives. Finding the optimal sampling strategy takes less than 2.5 minutes in the vast majority of cases.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2018

Adversarial Attack Type I: Generating False Positives

False positive and false negative rates are equally important for evalua...
research
09/27/2022

A Benchmark Comparison of Python Malware Detection Approaches

While attackers often distribute malware to victims via open-source, com...
research
02/13/2023

That Escalated Quickly: An ML Framework for Alert Prioritization

In place of in-house solutions, organizations are increasingly moving to...
research
04/20/2019

Performance and Resilience of Cyber-Physical Control Systems with Reactive Attack Mitigation

This paper studies the performance and resilience of a linear cyber-phys...
research
04/07/2023

SCART: Simulation of Cyber Attacks for Real-Time

Real-Time systems are often implemented as reactive systems that respond...
research
08/27/2022

Virtual Control Group: Measuring Hidden Performance Metrics

Performance metrics measuring in Financial Integrity systems are crucial...
research
03/01/2019

Automatic Techniques to Systematically Discover New Heap Exploitation Primitives

Heap exploitation techniques to abuse the metadata of allocators have be...

Please sign up or login with your details

Forgot password? Click here to reset