The case for attacking the attacker
Sebastian Garcia
Stratosphere Laboratory.
Czech Technical University in Prague
https://www.stratosphereips.org/
AD&D Workshop, Euro S&P, 2024
Active Defense and Deception
Active Defense and Deception
Defense
A multidisiplinary approach to protect your assets, values, resources, and business.
Defense
A multidisiplinary approach to protect your assets, values, resources, and business.
Cybersec Architecture: Passive
Arch Passive Defense
Cybersec Architecture: Passive
Cybersec Operation: Passive
Arch Passive Defense
Oper Passive Defense
Passive Defense
Active Defense and Deception
Active Defense
Proactive approach to protecting information systems and networks from threats. It involves taking dynamic and often aggressive measures to detect, analyze, and mitigate cyber attacks in real-time
Active Defense
Active Defense
Active Defense
Change (a binary decision)
Active Defense
Adapt (degrees of change. Predefined)
Active Defense
Learn (degrees of change. Learned)
Active Defense
Share
[1] Garcia, S., Gomaa, A., & Babayeva, K. Slips, behavioral machine learning-based Python IPS https://github.com/stratosphereips/StratosphereLinuxIPS
Active Defense
Engage
Why Active Defense?
Change
Adapt
Learn
Share
Not Moving Target Defense?
Active Defense
Active Defense
Arch Passive Defense
Oper Passive Defense
Active Defense and Deception
Deception
The act of causing someone to accept as true or valid what is false or invalid
Merrian-Webster Dictionary. Link
Deliberate measures to induce erroneous sensemaking and subsequent behaviour within a bio-digital target set, to achieve and exploit an advantage.
National Cyber Deception Laboratory. Link
Deception
Deception
The Ghost Army impersonated larger and more costly units.
Copied insignias in uniforms and cars, specific officers, morse code operators typing profiles, tracks in the soil, recorded sound of larger groups, and, of course, inflatable tanks.
The own Army believed they were real.
CyberDeception is Different
Lessons from 'kinetic' deception are nice but hard to translate. They were trying to deceive an enemy about defenses being better and larger.
CyberDeception. Why?
Deception
And, do not to make organizations more insecure
Psychological Deception
Opportunity to influence and change attackers:
Attention, Perception, Sensemaking, Expectation, Emotion, Behavior
If told deception may be used, attackers avoid weak systems
Deception Types
Daniel, D. C., & Herbig, K. L. (1982). Propositions on military deception. Journal of Strategic Studies.
https://www.cyberscarecrow.com/
Deception Types
Deception is Uncertainty
Design of Deception Engineering [1]
Methods, techniques, patterns, and tools to incorporate deception.
Why you need to think in advance?
Magruder’s principle: easier to convince a target into holding on to a pre-existing belief than it is to convince a target of something it does not believe.
[1] Faveri, C. D. (2021). Modeling Deception for Cyber Security. NOVA University.
Deception Engineering
Kahlhofer, M., & Rass, S. (2024). Application Layer Cyber Deception without Developer Interaction
AD&D 2024 Paper
Deception Can go Further
What about doing misinformation and propaganda?
Tested, with the best results obtained with a combination of informing the attackers about deception and using deception.
Deception Can go Further
Ferguson-Walter, K. J. (2020). An Empirical Assessment of the Effectiveness of Deception for Cyber Defense.
Can we do this on the Internet?
Deception Can go Further
Can we have...
But deception is not enough
Active Defense and Deception and Engaging
Engaging
To have contact and actively disrupt the operation of your attacker.
Engaging
Active Defense
Engaging
Arch Passive Defense
Oper Passive Defense
Engaging
Engaging. Not new.
2005 Book "Aggressive Network Self-defense". Link
2013 Conversation "The Ethics of Hacking Back: Cybersecurity and Active Network Defense". Link.
2013 Book "Offensive Countermeasures. The art of active defense" John Strand/Paul Asadoorian. Link
2015 News "Should Companies Strike Back at Hackers?". Tripwire. Link
2019. US Active Cyber Defense Certainty Act (ACDC)
The Rise of Engaging
2019. US Active Cyber Defense Certainty Act (ACDC)
Luckily, never approved.
The Rise of Engaging
2019. National Cyber Deception Laboratory, UK
"(...) a new government-backed national laboratory for cyber deception that aims to actively “take the fight to network attackers” rather than rely on passive measures to block incoming digital offensives."
The Rise of Engaging
It was 'mysteriously' left to expire... Sure.
The Rise of Engaging
Engage MITRE. 2022. https://engage.mitre.org/
Wait... global adversaries?
Engaging Cases
Engaging Cases
Engaging Tools
Engaging Tools
Engaging. Locally
Engaging Ideas
Engaging Ideas
Engaging Ideas
from scapy.all import *
# Define the network interface
interface = "eth0"
# Generate and send packets with random MAC addresses
def mac_flood():
while True:
pkt = Ether(src=RandMAC(), dst=RandMAC()) / IP(dst="192.168.1.1") / ICMP()
sendp(pkt, iface=interface, verbose=False)
if __name__ == "__main__":
mac_flood()
Engaging Ideas
import os, json, logging
from scapy.all import sniff, ARP
import subprocess
logging.basicConfig(filename='network_scan.log', level=logging.INFO,
format='%(asctime)s - %(message)s')
KNOWN_COMPUTERS_FILE = 'known_computers.json'
if os.path.exists(KNOWN_COMPUTERS_FILE):
with open(KNOWN_COMPUTERS_FILE, 'r') as f:
known_computers = json.load(f)
else:
known_computers = {}
def save_known_computers():
with open(KNOWN_COMPUTERS_FILE, 'w') as f:
json.dump(known_computers, f)
def scan_host(ip):
logging.info(f"Scanning new host: {ip}")
result = subprocess.run(["nmap", "-p-", ip], capture_output=True, text=True)
logging.info(result.stdout)
def process_arp_packet(packet):
if packet.haslayer(ARP) and packet[ARP].op in (1, 2):
mac, ip = packet[ARP].hwsrc, packet[ARP].psrc
if mac not in known_computers:
known_computers[mac] = ip
scan_host(ip)
save_known_computers()
print("Starting ARP packet sniffing...")
sniff(filter="arp", prn=process_arp_packet, store=0)
Conclusion
Engaging attackers in your local network can give an advantage to your protection by keeping the attackers busy, forcing their mistakes, and leaving more traces behind.
But we need you to advance and help understand how deception works.
We need to find the limits of technical active defense and psychological cyberdeception to better engage attackers.
Thanks!
Sebastian Garcia
https://www.stratosphereips.org/
https://infosec.exchange/deck/@eldraco
@eldraco
https://www.linkedin.com/in/sebagarcia/