AI can Help Improve Network Security

From Better Attacks to Better defenses

Sebastian Garcia, Stratosphere Lab
AIC, CTU, CZ

AI may improve security

But before there are many questions:
- When?
- How?
- What do we need?
- What are we doing wrong?
- How good can we actually be at detecting?
- How good can we actually be at attacking?

When?

When? Before an incident

- New things
- Unkowns
- Attempts
- Reconnaissance

- Find vulnerable things
- Trends
- Impact measure
- Train

😊

When? During an incident

- Was it completely successful?
- What is attacked?
- When did it started?
- From where? VPN?
- Who? Hacktivism? State?

- Is it contained?
- Got deep access?
- Miss something?
- Which technique?

😢

When? After an incident

- Something missed
- Report for political/legal action
- TI gathering
- Prosecute
- Bigger fish

🤔

In which one are you now?

Before, during or after?

In all of them

AI Needs Network Security
Datasets

Datasets are underestimated

- Research tends to be method-first.
- We do not usually evaluate if the data is good.
- We do not usually measure the bias in our data.
- We do not measure what we are missing.

Datasets. Benign

Getting malicious traffic is hard

Getting benign traffic is much harder

Datasets. Benign

- No clear definition of what it is
- Seasonality
- Cost of real labeling
- Privacy issues
- Legal issues
- Hard to publish. Anyone did?

Datasets. Labels

- The single most important commodity in datasets.
- Use experts for labeling.
- What are you labeling?
  - Src IP, dst IP, port, sequence, etc.
  - The same flow can have different labels
- Use tools, rules and ontology [1]

Datasets. Balance

- Bad ML requires 50/50 ratio of benign/malicious
- AD assumes >50% is benign

[1] CTU-SME-11 https://zenodo.org/record/7958259

Devices

Datasets are Not Enough

- Evaluate an attacker waiting?
- Evaluate a computer infected while being attacked?
- Evaluate IDS communicating between themselves?
- Evaluate the evolving TI feeds?
- Evaluate a human attacker taking decisions?

Detection with AI

Detection

We want to detect:

- All attacks

- All the time

- Without errors

- In real time

- And evolve

- And cheap

- Thank you

Detection

All attacks

Cohen, F. (1987). Computer viruses: Theory and experiments. Computers & Security, 6(1), 22–35. https://doi.org/10.1016/0167-4048(87)90122-2

No, we can't probably do this one

Detection

All the time

- In the lifecycle of an attack/malware
- Different conditions

Yeah, we can probably do this one

Detection

Without errors


- As Cohen said, no perfect detection, so we will have errors.

No, we can't probably do this one

Detection

In real time

Yeah, we can probably do this one given enough hardware and money

Is Detection Hard?

Detecting some malicious is not hard

Detecting some malicious among benign is hard.

Detection depends...

- Depends on what you want to detect.
  - Packets, flows, IPs, Users.

- Depends on how you count errors.

- Depends on time. Do you undetect?

- Depends on your assumptions, definitions, bias.

Detection and XAI

- Explanation is crucial.
- But explain what? features? data issues?
 concept drift issues?
- We need a good evaluation of XAI for netsec.

Detection and XAI

Flows vs IPs

Detection and LLMs

- LLMs are used to summarize in many commercial products.
- For some things, like DGA, they are good.
- For flows, not so much.

Attacks and LLMs

AiDojo

https://www.stratosphereips.org/ai-dojo

Attacks and LLMs

"Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments" Rigaki, Lukáš, Catania, Garcia

The Case for an Active Defense

Active Defense

"Proactive approach to protecting information systems and networks from threats. It involves taking dynamic and often aggressive measures to detect, analyze, and mitigate cyber attacks in real-time"

How?

Change

  • - A product demands to block an IP in a FW.

  • - SIEM blocks an account in Active Directory

  • - SIEM terminates Cloud sessions

  • - EDR/XDR kills a process.

  • - Proxy blocks URL

- Change the network bandwidth for a host.

- Change the API bandwidth access.

Adapt

- AI

  - Learn from the attack's adaptations.

  - Learn from the attacker's decision.

  - Learn better profiling.

- Human-in-the-loop. "Assisted"

  - Playbooks are here.

Learn

- Sharing IoC as defense

  • - Slips IDS local P2P TI sharing [1].

  • - Local IPs too?

  • - Trust-based, adversary-resilient.

Share

[1] Garcia, S., Gomaa, A., & Babayeva, K. Slips, behavioral machine learning-based Python IPS https://github.com/stratosphereips/StratosphereLinuxIPS

- Deception


- Attack Back
 

Engage

Deception

- Early warning systems for faster blocking.

- Minimize time to detection.

- Minimize false positives.

- Profile attackers? almost nobody does.

- Slow attacks down? Make difficult.

ShelLM: Deception and LLMs

- Fake LinkedIn profiles of people.

- Fake questions asking to fix our "FortiGate 6000F".

- Fake internal tickets about detected attackers

- Fake versions of all our servers and services.

- Fake underground forums leaked data.

- Fake announcement "Hit by ransomware".

Deception can go Further

To have contact and actively disrupt the operation of your attacker.

Attack Back

2019. US Active Cyber Defense Certainty Act (ACDC)

 

- To allow engaging in "active cyber defense measures"

- Only qualified defenders can engage.

- Companies must inform the FBI

- Allowed to identify attackers, disrupt attacks, and monitor.

- Prohibited to destroy data or cause significant harm to others.

Not new: ACDC

2019. National Cyber Deception Laboratory, UK

 

"(...) a new government-backed national laboratory for cyber deception that aims to actively “take the fight to network attackers” rather than rely on passive measures to block incoming digital offensives."

The Late NCDL

Engage MITRE. 2022.

"assist defenders in understanding the intricacies of adversary engagement strategies and technologies."

Engage MITRE

- Can provide very good defenses in your local network.

- But you need crazy good detection.

- Mix it with deception.

- Consult your lawyer.

Engage

- AI can help but we are far from done.

- We still don't completely understand the problem.

- Testing is not rigorous. Companies have close tech.

- Data is scarce and not covering enough.

- Active defense can be a good addition.

Conclusion

Thanks!

Sebastian Garcia

Stratosphere Laboratory, CTU University
https://www.stratosphereips.org/
sebastian.garcia@agents.fel.cvut.cz
@eldracote

Detection. LLMs

Our security LLM challenge

Attacks to AI/ML

Real Engaging

CNSM Keynote. AI can help Improve Network Security

By eldraco

CNSM Keynote. AI can help Improve Network Security

Keynote day one of CNSM Conference 2024

  • 55