Optimizing Personalized Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks
|
|
|
- Abner Lambert
- 10 years ago
- Views:
Transcription
1 Optimizing Personalized Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks Mengchen Zhao School of Computer Engineering Nanyang Technological University Singapore Bo An School of Computer Engineering Nanyang Technological University Singapore Christopher Kiekintveld University of Texas, El Paso El Paso, TX Abstract Highly targeted spear phishing attacks are increasingly common, and have been implicated in many major security breeches. filtering systems are the first line of defense against such attacks. These filters are typically configured with uniform thresholds for deciding whether or not to allow a message to be delivered to a user. However, users have very significant differences in both their susceptibility to phishing attacks as well as their access to critical information and credentials that can cause damage. Recent work has considered setting personalized thresholds for individual users based on a Stackelberg game model. We consider two important extensions of the previous model. First, in our model user values can be substitutable, modeling cases where multiple users provide access to the same information or credential. Second, we consider attackers who make sequential attack plans based on the outcome of previous attacks. Our analysis starts from scenarios where there is only one credential and then extends to more general scenarios with multiple credentials. For single-credential scenarios, we demonstrate that the optimal defense strategy can be found by solving a binary combinatorial optimization problem called PEDS. For multiple-credential scenarios, we formulate it as a bilevel optimization problem for finding the optimal defense strategy and then reduce it to a single level optimization problem called PEMS using complementary slackness conditions. Experimental results show that both PEDS and PEMS lead to significant higher defender utilities than two existing benchmarks in different parameter settings. Also, both PEDS and PEMS are more robust than the existing benchmarks considering uncertainties. Introduction is not a secure communications channel, and attackers have exploited this via spam s for many years. However, in recent years cyber attacks using have become increasingly targeted and much more damaging to organizations (TrendLabs 12). These targeted attacks are commonly known as spear phishing. They target individuals or small groups of people, but use personal information and social engineering to craft very believable messages with the goal of inducing the recipient to open an attachment, or visit an unsafe website by clicking a link. Executing a spear Copyright c 16, Association for the Advancement of Artificial Intelligence ( All rights reserved. phishing attack is much more costly than sending a broad spam message, but it is also much more likely to succeed and the potential damage is much greater. For example, in 11 the RSA company was breached by a spear phishing attack (Zetter 11). This attack resulted in privileged access to secure systems, and stolen information related to the company s SecurID two-factor authentication products. filtering systems are one of the primary defenses against both spam and spear phishing attacks. These systems typically use black and white lists as well as machine learning methods to score the likelihood that an is malicious before sending it to a user (Bergholz et al. ). Setting the threshold for how safe a message must be to be delivered is a key strategic decision for the network administrator (Sheng et al. 9). If the threshold is too high, malicious s will easily pass the filtering system, but if the threshold is too low normal s will be filtered. Recent work has proposed a game-theoretic model that can improve the effectiveness of filtering if thresholds are personalized according to individuals values and susceptibilities (Laszka, Vorobeychik, and Koutsoukos 15). They assume that the attacker s strategy is simply selecting a subset of users to attack that maximizes an additive expected reward, ignoring the cost of attacks and the outcome of previous attacks. However, in many incidents such as Operation Aurora (Varma ), attackers launches sophisticated attacks toward few targets over months. In such cases, attackers have plenty time and attack resources and they can plan long term sequential attack strategies to achieve difficult objectives (Watson, Mason, and Ackroyd 14). In this paper we extend the literature (and particularly the personalized filtering model of (Laszka, Vorobeychik, and Koutsoukos 15)) to consider more sophisticated attackers who can make sequential decisions about which users to send spear phishing s to. Specifically, we consider more complex (also realistic) objective functions for both the attacker and defender, including modeling attack costs, and situations where it is only necessary to compromise one user from a set of users that has access to important data or credentials (i.e., the user values are substitutable). Our contributions are fourfold. First, we consider the case where there is a single important credential that the attacker seeks to gain and model the attacker s decision making as a Markov Decision Process (MDP). We formulate
2 a bilevel optimization problem for the defender and show that the attacker s problem (i.e., lower level problem) can be solved by a linear program. Solving the linear program is computational consuming since the number of variables and constraints grow exponentially with the number of users. Our second contribution is to find a simplified representation of the defender s utility and thus reduce the defender s bilevel program into a single level binary combinatorial optimization program (which we call PEDS) by exploiting the structure of the attacker s MDP. Our third contribution is to extend the single-credential case to a a more general case where there could be multiple sensitive credentials. For the multiple-credential case, the defender s utility cannot be represented in the same way as the single-credential case. We consider the dual program of the linear program that solves the attacker s MDP and represent the defender s loss from spear phishing attacks by a linear combination of dual variables. We then propose a single level formulation (which we call PEMS) for the defender, which is reduced from the proposed bilevel problem using complementary slackness conditions. Our fourth contribution is to evaluate PEDS and PEMS by comparing our solutions with two existing benchmarks and show that our solutions lead to significant higher defender utilities in different parameter settings and are also robust considering uncertainties. Sequential Attacks with A Single Credential We consider a spear phishing game between an attacker and a defender. The defender (e.g., an organization) has a credential 1 that can be accessed by a set of users U = {1, 2,..., U }. For now we consider only a single credential, and later generalize the model to multiple credentials. The attacker, wanting to gain access to the credential, sends spear phishing s to the users based on an attack plan taking into account the susceptibility, confidentiality level and attack cost of the users. We denote by a u the susceptibility of user u, meaning that u will be compromised with probability a u after a spear phishing is delivered to her. There are many methods to measure a u, e.g., by sending probe s to the users (Sheng et al. ; Kelley ; Jagatic et al. 7). We denote by k u the confidentiality level of user u, meaning that user u can access the credential with probability k u when she is compromised. The attacker sustains some costs when launching attacks, such as crafting phishing s, investigating users and writing malware. We denote by c u the cost of attacking user u. When receiving s, the filter first scores them according to their likelihood of being malicious s, and then delivers only those with scores lower than a given threshold (Deshmukh, Shelar, and Kulkarni 14; Bergholz et al. ). It is possible that malicious s are misclassified as normal ones. We call such misclassifications false negatives. On the other side, some normal s might be misclassified as malicious. We call such misclassifications false positives. In binary classification, a threshold determines a pair (x u, y u ) where x u, y u [, 1] are the false negative rate 1 We use the generic term credential here to mean any critical data or access privilege that the attacker is seeking to gain. Discarded User Alerted Credential not Accessed Spear (1 x u ) (1 a u ) (1 k u ) Phishing User s (x u ) (a u ) compromised (k u ) Figure 1: Spear Phishing Attack Flow Credential accessed and the false positive rate, respectively. Moreover, the relationship between x u and y u can be characterized as a function Φ : [, 1] [, 1], y u = Φ(x u ), which is a Receiver Operating Characteristic (ROC) curve, with y-axis replaced by false positive rate (Fawcett 6). In practice, Φ is represented by a set of data points and can be approximated by a piecewise linear function φ (Bouckaert 6). By adjusting the thresholds, the organization can determine a pair (x u, y u ) for each user. We will use the false negative rate vector x to represent the defender s strategy. But note that using y as the defender s strategy is equivalent to as Φ and φ are bijections. Intuitively, the defender actually controls the probability that malicious s will pass the filter (x u ) and the probability that normal s will be filtered (y u ). Figure 1 shows the attack flow. The attacker sends a spear phishing to a targeted user. The will pass the filter with probability x u and otherwise be discarded. We assume that the attacker is able to observe whether the is delivered and opened by the user using tracking techniques 2. When receiving the , the user will be tricked with probability a u and otherwise be alerted. We assume that if the user is tricked, she will be compromised, and if the user is alerted, she will be aware of being targeted and not be tricked by subsequential phishing s. If the user is compromised, the attacker can access the credential with probability k u. Stackelberg Spear Phishing Game We model the interaction between the defender and the attacker as a Stackelberg game. The defender moves first by choosing a false negative probability vector x. After observing x 3, the attacker launches an optimal attack. We denote by π x the attacker s optimal policy that maximizes his expected utility given the defender s strategy x. We denote by P a (x, π x ) the attacker s expected utility and by P d (x, π x ) the defender s expected utility given s- trategy profile (x, π x ). We denote by L the value of the credential. The attacker suffers a cost c u each time he attacks user u and he gains L if he accesses the credential. The defender s loss is threefold. (1) The defender loses L if the credential is accessed by the attacker. (2) The defender loses F P u for per normal sent to user u filtered. (3) Besides spear phishing attacks, the defender also faces mass 2 For example, Yesware provides services allowing their clients to view the detailed status of outgoing s, including whether the s are opened and the time the receivers spend on each (hlatky 15). 3 We make the worst-case assumption that the attacker knows x since spear phishers collect security information about the organization before attacking (Choo 11).
3 attacks (e.g., spam and regular phishing s), which are usually less harmful than spear phishing attacks. We assume that the probability that a mass attack passes the filter is x 4 u and the defender loses N u for per mass attack delivered to user u. Note that the defender sustains the second and the third parts of loss constantly as normal s and mass attack s are sent to users constantly. However, spear phishing attacks usually happen in a relatively short period. To make the three kinds of losses comparable, we assume that the defender s expected utility is measured in a time period T. We denote by F Pu T the expected loss of misclassifying normal s sent to user u and by Nu T the expected loss of delivering mass attack s sent to user u during T, which can be computed by F P T u = F P u E[number of normal s sent to u during T ] N T u = N u E[number of mass attack s sent to u during T ] The defender s loss from filtering normal s and delivering mass attack s can be simply represented as the summation of the loss from every individual user, u U x unu T and u U φ(x u)f Pu T respectively. However, the defender s loss from spear phishing attacks is not cumulative. We denote by ρ T the probability that the spear phishing attacks occur in time period T and by θ(x, π x ) the probability that the attacker will access the credential given the strategy profile (x, π x ). Then the defender s expected utility can be represented as P d (x,π x)= ρ T θ(x,π x)l u U x un T u u U φ(x u)f P T u (1) We consider the widely used strong Stackelberg equilibrium (SSE) as our solution concept (Korzhyk et al. 11; Gan, An, and Vorobeychik ; Yin et al. 15; Yin, An, and Jain 14). Definition 1. If a strategy profile (x, π x ) such that P d (x, π x ) P d (x, π x ) holds for any possible x, under the assumption that the attacker plays a best response and breaks ties among multiple optimal policies in favor of the defender, then (x, π x ) is an SSE strategy profile. Optimal Attack with A Single Credential In this section, we model the attacker s decision making as a Markov Decision Process (MDP) and show that the MDP can be solved by a linear program. Attacker s MDP The attacker s MDP can be represented as a tuple (S, A, T, R, π). S = {s s U} {s n, s y } is the state space that consists of non-terminal states and two terminal states s n, s y. A non-terminal state corresponds to a subset of the user set U that represents the users who have not been alerted or compromised. The initial state is s = U. The terminal state s n represents the situation where the attacker stops 4 This assumption means that the classification accuracies for spear phishing s and mass attack s are the same. Note that our approach can be easily extended to the case where these accuracies are different, by introducing a function that captures the relationship between these accuracies. attacking without accessing the credential, while s y represents the situation where the attacker stops attacking with the credential accessed. A = {a a = u U or a = stop} is the attacker s action space where a = u means that the attacker chooses to attack user u, and a = stop means that the attacker stops attacking. We denote by A s = {a a = u s or a = stop} the attacker s action space at non-terminal s- tate s, since the attacker only attacks users that have not been alerted or compromised. Transition function T (s, a, s ) represents the probability that s transitions to s by executing action a. Reward function R(s, a, s ) represents the attacker s reward when s transitions to s by executing action a. π : S A is a deterministic function that projects each non-terminal state to an action. Now we define T and R. We assume that the terminal s- tates always transition to themselves with probability 1 and with reward. For any non-terminal state s, if the attacker stops attacking, s transitions to s n with reward. If the attacker chooses to attack user u A s, there are four possible transitions: (1) If the malicious fails to pass the filter, s transitions to itself. The transition probability is 1 x u and the reward is c u. (2) If the is delivered and user u is alerted, s transitions to s u = s \ {u}. The transition probability is x u (1 a u ) and the reward is c u. (3) If the passes the filter and u is compromised, however u does not have access to the credential, then s transitions to s u = s \ {u}. The transition probability is x u a u (1 k u ) and the reward is c u. Note that in both transitions (2) and (3), s transitions to s u with the same reward c u. Therefore they can be merged into one transition with probability x u (1 a u )+x u a u (1 k u ) = x u (1 a u k u ) and with reward c u. (4) The passes the filter, user u is compromised and she can access the credential, s transitions to s y. The transition probability is x u a u k u. The transition function T and the reward function R can be summarized as: T (s, a, s ) R(s, a, s ) a = stop, s = s n 1 a = u A s, s = s 1 x u c u a = u A s, s = s u x u(1 a uk u) c u a = u A s, s = s y x ua uk u L c u Solving the MDP The value function V π : S R represents the attacker s expected utility when his current state is s and he follows a policy π afterwards. Moreover, we denote by V the value function when the attacker follows the optimal policy π x. Then the attacker s expected utility can be written as P a (x, π x ) = V (s ). The attacker s MDP can be solved by the following linear program (Schweitzer and Seidmann 1985). min µ(s)v Va a (s) (2) s S\S T s.t. Va (s) T (s, a, s ) [ R(s, a, s ) + Va (s ) ] s S a A s, s S \ S T (3) V a (s) =, s S T (4)
4 where S T = {s n, s y } denotes the set of terminal states and µ(s) is the probability that the MDP starts from state s. S- ince we have an initial state s, µ(s) = 1 if s = s and otherwise. The optimal policy π x can be obtained: π x (s) = arg max a A s Q(s, a), s S \ ST, where Q(s, a) = s S T (s, a, s ) [R(s, a, s ) + V a (s )]. Optimal Defense with A Single Credential The defender seeks a false negative probability vector x that maximizes her expected utility given that the attacker plays the optimal policy π x. The defender s optimization problem is given by the following bilevel optimization program. max P d (x, π x x) (5) s.t. x u [, 1], u U (6) π x arg max V π (s π ) (7) Eq.(5) represents the defender s expected utility. Eqs.(6) indicates that the false negative rate can only be chosen from [, 1]. Eq.(7), i.e., the lower level problem, assures that the attacker always responds optimally. The hardness of solving Eqs.(5)-(7) is twofold. First, θ(x, π x ) in Eq.(5) does not have an explicit representation with respect to variables x. Second, the lower level problem is hard to be characterized by a set of constraints. We will first show how to represent θ(x, π x ), and then show that bilevel program Eqs.(5)-(7) is equivalent to a single level program called PEDS. Representing θ(x, π x ) In fact, θ(x, π x ) is the probability that the attacker ends in the terminal state s y given that he follows the optimal policy π x. Before we show how to represent θ(x, π x ), we introduce two concepts: reachable states and potential attack set. Once a policy is determined, the MDP is reduced to a Markov chain where only some states (called reachable s- tates) can be reached from the initial state if we consider the Markov chain as a graph. For example, if s ={u 1, u 2 } and π(s )=u 1, then state s={u 1 } cannot be reached from s with a nonnegative probability. We denote by (π) the set of reachable states given the policy π. A policy π projects each reachable state s (π) to an action a A s. We denote by Γ(π) the potential attack set, which is the set of users that are projected from the reachable states under the policy π, i.e., Γ(π) = {π(s) s (π)}. Lemma 1 states that if the immediate expected gain of attacking user u (i.e., x u a u k u L) is greater than the attack cost c u, then the user is in the potential attack set 5. Lemma 1. u Γ(π x ) if and only if x u a u k u L > c u. Lemma 2 shows that θ(x, π x ) can be easily computed given the potential attack Γ(π x ). Lemma 2. { 1 θ(x, π x) u Γ(π = x) (1 auku), if Γ(πx)., if Γ(π x) = 5 All proofs of Lemmas and Theorems are in the appendix: AAAI16_Phishing_Appendix.pdf. Combining Lemmas we can show that even though the attacker may have multiple optimal policies, they have the same potential attack set. Therefore, θ(x, π x ) does not change for different optimal attack policies. Theorem 1. The defender s expected utility remains the same no matter how the attacker breaks ties, i.e., choosing any optimal policy. PEDS: Reduced Single Level Program Now we show how to solve Eqs.(5)-(7) based on the lemmas. We define a function Λ u for each user u: Λ u (x) = xn T u + φ(x)f P T u, x [, 1]. Λ u (x) represents the total loss from mass attacks and false positives of user u if she is assigned a false negative probability x. Λ u is a piecewise linear function since it is the sum of a linear function and a piecewise linear function. Therefore, we can easily find a set arg min x Λ u for each user. We rewrite the defender s utility as P d (x, π x ) = ρ T θ(x, π x )L u U Λ u (x u ). Lemma 2 indicate that the value of θ(x, π x ) depends on the c potential attack set Γ(π x ). We define a set U = {u u La uk u [, 1], u U}. If u U \ U, the optimal false negative rate x u can be any arbitrary point of arg min x Λ u since u Γ(π x ) holds for any x u [, 1]. If u U, it holds that c u Γ(π x ) when x u [, u La uk u ] and u Γ(π x ) when c x u ( u La uk u, 1]. Given u U, we denote by x 1 u the optimal false negative rate if u Γ(π x ) and by x 2 u the optimal false negative rate if u Γ(π x ). Theorem 2. x 1 u is an arbitrary point in arg min x [, cu Lauku ] Λ u and x 2 u is an arbitrary point in arg min x ( cu Lauku,1] Λ u. Then program Eqs.(5) - (7) are equivalent to the following binary combinatorial optimization problem, which we call PEDS (Personalized thresholds in Defending Sequential spear phishing attacks): max α ρ T (1 u U β u)l u U Λ u(x u) (8) s.t. x u = x u, u U \ U (9) β u = 1, u U \ U () x u = x 1 u + (x 2 u x 1 u)α u, u U (11) β u = 1 a uk uα u, u U (12) α u {, 1}, u U (13) where x u can be an arbitrary point from arg min x Λ u. α u is the indicator of whether user u is in the potential attack set Γ(π x ). α u = indicates that u is in Γ(π x ) and 1 otherwise. Since PEDS s decision variables are binary, we can find the optimal solutions by using CPLEX CP Optimizer. Multiple-Credential Model An organization may need to protect many different credentials or pieces of sensitive information. We now consider the
5 multiple-credential case, where the attacker s decision making can still be modeled as an MDP. Note that Eqs.(5) - (7) still represent the defender s optimization problem except that π and V represent the policy and the value function of the new MDP. In this section, we first introduce the attacker s MDP with multiple credentials. Then we give the dual formulation of Eqs.(2) - (4) and show that using complementary slackness conditions, Eq.(7) (i.e., the lower level optimization problem) can be replaced by a set of constraints, which guarantee that the attacker plays the best response. Consequently, bilevel program Eqs.(5) - (7) is reduced to a single level program which can be directly solved. Optimal Attack with Multiple Credentials We denote by H = {1, 2,..., H } the set of credentials, by L h the value of the credential h and by m h u the probability that user u can access credential h. With multiple credentials, the attacker s MDP can be represented as a tuple (S, A, T, R, π). S = P(U) P(H) is the state space, where P(U) (P(H)) is the power set of U (H). A state s S can be represented as s = s(u) s(h), where s(u) U represents the set of users that have not be alerted or compromised and s(h) H represents the set of credentials that have not been accessed by the attacker. s is a terminal state if either s(u) = or s(h) =, i.e., all the users have been alerted or compromised, or all credentials have been accessed. We use S T to represent the set of terminal states. At each non-terminal state, the attacker s action s- pace is A s = {a a = u s(u) or a = stop}, in the sense that the attacker does not attack users that have been alerted or compromised. π : S A represents a policy of the attacker. T (s, a, s ) represents the probability and R(s, a, s ) represents the attack reward that s transitions to s by executing action a. We assume that terminal states transition to themselves with probability 1 and reward. We define the transitions and rewards as follows. (1) If s = s(u) s(h) is a non-terminal state and the attacker chooses to stop attacking at s, s transitions to the terminal state s = s(h) with probability 1 and reward. (2) If s = s(u) s(h) is a non-terminal state and the attacker chooses to attack a user u s(u) at s, there are 3 kinds of transitions. (2.1) The malicious is filtered, in which case s transitions to itself. The transition probability is 1 x u and the reward is c u. (2.2) The malicious is delivered and user u is alerted, in which case s transitions to s = s(u) \ {u} s(h). The transition probability is x u (1 a u ) and the reward is c u. (2.3) The malicious is delivered and user u is compromised, after which the attacker will access each credential h H with probability m h u. We have T (s, a = u, s ) =, if s (U) s(u)\{u} or s (H) s(h), x u a u m h u (1 m h u), otherwise. h s(h)\s (H) h s (H) The associated rewards R(s, a=u, s ) =, if s (U) s(u)\{u} or s (H) s(h), L h, otherwise. h s(h)\s (H) The MDP can still be solved by linear program Eqs.(2)-(4). Defender s Loss from Spear Phishing Attacks When there are multiple credentials, the probability of losing the credentials cannot be computed in the same way as in the single-credential case. We introduce another way to represent the defender s expected utility. Consider the dual of linear program Eqs.(1)-(3): max W s.t. s S\S T a A s s S a A s W (s, a )=µ(s )+ T (s, a, s )R(s, a, s )W (s, a) (14) s S\S T a A s W (s, a)t (s, a, s ) s S \ S T (15) W (s, a) R +, a A s, s S \ S T (16) The dual variable W is called the occupation measure (Borkar and Ghosh 1992). W (s, a) can be interpreted as the expected total number of times that the system is in state s and action a is executed. a As W (s, a) is the expected total number of visits to state s. We define a reward function R d (s, a, s ) for the defender. { (R(s, a, s R d (s, a, s ) + c ) = u ), if a = u A s,, if a = stop. Recall that R(s, a, s ) is the attacker s reward when he executes action a and the state transitions from s to s. In fact, R(s, a, s ) consists of the gain of accessing some credentials (positive) and the cost of attack (negative). The defender s loss can thus be represented as (R(s, a, s ) + c u ) if a = u A s, and if a = stop. Therefore the defender s expected loss from spear phishing attacks can be represented as s S\S T,a A s W (s, a) s S T (s, a, s )R d (s, a, s ). Single Level Formulation It follows that feasible solutions V a and W are optimal for the original LP and its dual problem if the following complementary slackness conditions are satisfied: {Va (s) T (s, a, s )[R(s, a, s ) + Va (s )]}W (s, a) =, s S a A s, s S \ S T. (17) Then the bilevel program Eqs.(5)-(7) can be converted to the following single level program, which we call PEMS (Personalized thresholds in protecting Multiple credentials): max x ρ T W (s, a) T (s, a, s )R d (s, a, s ) s S\S T,a A s s S u U Λ u(x u) (18) s.t. Eqs.(3), (4), (15) and (17) W (s, a) R +, a A s, s S \ S T (19) x u [, 1], u U () PEMS is a nonlinear program as Eqs.(3), (15), (17) and (18) are nonlinear. We can use solver KNITRO to solve PEMS.
6 Credentials 6 Credentials 4 Credentials 2 Credentials 5 PEDS 15 (e) PEMS: Runtime PEMS (f) PEMS: Solution quality PEDS(Exact) PEDS(5%) 1 PEDS(%) PEMS(Exact) PEMS(%) PEMS(5%) (g) PEMS:Robustness w.r.t. cu PEDS(Exact) PEDS(5%) PEDS(%) (d) PEDS:Robustness w.r.t. au (c) PEDS:Robustness w.r.t. cu (b) PEDS: Solution quality Runtime (Seconds) (a) PEDS: Runtime Runtime (Seconds) PEMS(Exact) PEMS(%) PEMS(5%) (h) PEMS:Robustness w.r.t. au Figure 2: Runtime Performance: (a) and (e), Solution Quality Comparisons: (b) and (f), Robustness Analysis (c), (d), (g) and (h) Experimental Evaluation We evaluate PEDS and PEMS in terms of runtime, solution quality and robustness. All values of parameters are uniformly randomly generated from an interval unless otherwise specified. Specifically, values of credentials are generated from [,15]. Attack costs cu are generated from [,2]. Users susceptibilities au and their accesses to credentials ku (mhu in multiple-credential case) are generated from [,.5]. Losses from mass attacks NuT and losses from false positives F P T are generated from [,1] and [,5], respectively. PEDS is solved by CPLEX CP Optimizer (version 12.6) and PEMS is solved by KNITRO (version 9.). All computations were performed on a 64-bit PC with 16 GB RAM and a quad-core Intel E GHz processor. We use a -section piecewise linear function φ to approximate the original false negative-false positive function Φ, which is drawn from prior work (Laszka, Vorobeychik, and Koutsoukos 15). We compare the solutions computed by PEDS and PEMS with two existing benchmarks. : All users have a uniform false negative rate x [, 1] that maximizes the defender s expected utility. We discretize the interval [,1] into equal-distance points and search among these points to find the optimal value x. In addition, we will use x as the starting point when solving PEMS. (Laszka, Vorobeychik, and Koutsoukos 15): An existing approach for personalized threshold setting assumes that the defender s expected loss from spear phishing attacks is the sum of users individual expected losses. Following our notations, user u s individual loss is set to the immediate expected P loss xu au ku L in the single-credential case and xu au h H mhu Lh in the multiple-credential case. Scalability Analysis We first evaluate the scalability of PEDS and PEMS. We assume that each credential can only be accessed by % of total users with nonzero probability considering that sensitive information is usually accessed by a small portion of total users. Figure 2(a) shows that PEDS can solve games with 7 users in 23s. Figure 2(e) shows that both the number of users and the number of credentials have significant influence on the runtime of PEMS. PEMS runs slower than PEDS since nonlinear programs are usually more computationally consuming. However, we argue that both PEDS and PEMS are applicable in real-world cases due to two reasons. First, spear phishing attacks, unlike mass attacks, usually jeopardize a small group of people. For example, in the attack towards the US Nuclear Regulatory Commission, only 16 employees are targeted (Rosenblatt 14). Second, in our model the defender does not need to update her strategy adaptively so that the runtime requirement is not very high. Solution Quality Comparisons We compare our approaches with two benchmarks for different values of ρt, which measures the probability that spear phishing attacks happen in T. Note from Figure 2(b) and Figure 2(f), when ρt =, meaning that there is no spear phishing attacks, our approaches lead to the same defender utilities as Laszka et al.. In this case the defender s optimal strategy is simply setting xu = arg maxx Λu (x) for each user u, considering only mass attacks and false positives. With ρt growing, Laszka et al. performs significantly worse than our approaches. Our approaches outperform the optimal uniform strategy. This is because that the optimal uniform strategy is computed under the constraints that all users thresholds are equal. We compare our approaches with the optimal uniform strategy to show how much improvement personalization can bring. Our approaches also outperform. The reason is, when computing defender strategy of, the attacker is assume to launch a non-sequential attack. It s not surprising that this strategy performs poorly when against a sequential decision making attacker. Moreover, note from Figure 2(b) that performs even worse than the optimal uniform strategy when ρt >.5. This indicates that estimation about the attacker s behaviour may be even more important than personalization. Robustness Analysis Defender s estimation of the attack cost and user susceptibility may not be perfect. We con-
7 sider a noise on c u and a u. In this section of experiments, estimations of c u are drawn uniformly from two intervals c u [1 5%, 1+5%] and c u [1 %, 1+%]. Estimations of a u are drawn from a u [1 5%, 1+5%] and a u [1 %, 1+%]. We use these estimations to compute the defender strategy and then use this strategy to compute the defender s utility in the accurate parameter setting. Figure 2(c) (Figure 2(g)) shows that PEDS (PEMS) outperforms both benchmarks even with a % error range on attack cost c u in single-credential (multiple-credential) case. Similarly, Figure 2(d) (Figure 2(h)) shows that PEDS (PEMS) outperforms both benchmarks w.r.t. the susceptibility measurement a u in single-credential (multiple-credential) case. Conclusion This paper studies the problem of setting personalized filtering thresholds against sequential spear phishing attacks. We first consider a simple single-credential case and then extend it to a more general multiple-credential case. Our approach features the following novelties. (1) An MDP framework is proposed to model the sequential decision making attacker. (2) An efficient binary combinatorial optimization formulation PEDS is proposed for computing solutions for the single-credential case. (3) With multiple credentials, the defender s loss from spear phishing attacks is represented by a linear combination of dual variables. (4) A single level formulation PEMS, which is reduced from the defender s bilevel program using complementary slackness conditions, is proposed for computing solutions for the multiplecredential case. Acknowledgement This material is based upon work supported by the National Science Foundation under Grant No. IIS References Bergholz, A.; De Beer, J.; Glahn, S.; Moens, M.; Paaß, G.; and Strobel, S.. New filtering approaches for phishing . Journal of computer security 18(1):7 35. Borkar, V., and Ghosh, M Stochastic differential games: Occupation measure based approach. Journal of optimization theory and applications 73(2): Bouckaert, R. R. 6. Efficient auc learning curve calculation. In AI 6: Advances in Artificial Intelligence. Springer Choo, K. R. 11. The cyber threat landscape: Challenges and future research directions. Computers & Security (8): Deshmukh, P.; Shelar, M.; and Kulkarni, N. 14. Detecting of targeted malicious . In IEEE Global Conference on Wireless Computing and Networking (GCWCN 14), Fawcett, T. 6. An introduction to ROC analysis. Pattern recognition letters 27(8): Gan, J.; An, B.; and Vorobeychik, Y. Security games with protection externalities. In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI 15), Hlatky, P. 15. How does yesware tracking work? Jagatic, T. N.; Johnson, N. A.; Jakobsson, M.; and Menczer, F. 7. Social phishing. Communications of the ACM 5():94. Kelley, P. G.. Conducting usable privacy & security studies with amazons mechanical turk. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUP- S ). Korzhyk, D.; Yin, Z.; Kiekintveld, C.; Conitzer, V.; and Tambe, M. 11. Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. Journal of Artificial Intelligence Research 41(2): Laszka, A.; Vorobeychik, Y.; and Koutsoukos, X. 15. Optimal personalized filtering against spear-phishing attacks. In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI 15), Rosenblatt, S. 14. Nuclear regulator hacked 3 times in 3 years. Schweitzer, P. J., and Seidmann, A Generalized polynomial approximations in Markovian decision processes. Journal of mathematical analysis and applications 1(2): Sheng, S.; Kumaraguru, P.; Acquisti, A.; Cranor, L.; and Hong, J. 9. Improving phishing countermeasures: An analysis of expert interviews. In Proceedings of the 4th AP- WG ecrime Researchers Summit, Sheng, S.; Holbrook, M.; Kumaraguru, P.; Cranor, L. F.; and Downs, J.. Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, TrendLabs. 12. Spear-phishing Most favored APT attack bait. Technical report, Trend Micro. Varma, R.. Combating Aurora. Technical report, M- cafee Labs. Watson, G.; Mason, A.; and Ackroyd, R. 14. Social Engineering Penetration Testing. Elsevier. chapter 4, Yin, Y.; An, B.; and Jain, M. 14. Game-theoretic resource allocation for protecting large public events. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI 14), Yin, Y.; Xu, H.; Gan, J.; An, B.; and Jiang, A. X. 15. Computing optimal mixed strategies for security games with dynamic payoffs. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 15), Zetter, K. 11. Researchers uncover RSA phishing attack, hiding in plain sight.
Game Theory Meets Information Security Management
Game Theory Meets Information Security Management Andrew Fielder 1, Emmanouil Panaousis 2, Pasquale Malacaria 2, Chris Hankin 1, and Fabrizio Smeraldi 2 1 Imperial College London {andrew.fielder,c.hankin}@imperial.ac.uk
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Support Vector Machines Explained
March 1, 2009 Support Vector Machines Explained Tristan Fletcher www.cs.ucl.ac.uk/staff/t.fletcher/ Introduction This document has been written in an attempt to make the Support Vector Machines (SVM),
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Analyzing the Effectiveness of Adversary Modeling in Security Games
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence Analyzing the Effectiveness of Adversary Modeling in Security Games Thanh H. Nguyen 1, Rong Yang 1, Amos Azaria 2, Sarit Kraus
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI
Information Security Threats and Strategies Ted Ericson Product Marketing - ASI Agenda Security breaches today Attack vector mitigation Secure web implementation Penetration testing ASI Corporate Security
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
Two-Stage Stochastic Linear Programs
Two-Stage Stochastic Linear Programs Operations Research Anthony Papavasiliou 1 / 27 Two-Stage Stochastic Linear Programs 1 Short Reviews Probability Spaces and Random Variables Convex Analysis 2 Deterministic
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
Sharing Online Advertising Revenue with Consumers
Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, [email protected] 2 Harvard University.
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,
Best-response play in partially observable card games
Best-response play in partially observable card games Frans Oliehoek Matthijs T. J. Spaan Nikos Vlassis Informatics Institute, Faculty of Science, University of Amsterdam, Kruislaan 43, 98 SJ Amsterdam,
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
Cyber-Security Analysis of State Estimators in Power Systems
Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Measuring Intrusion Detection Capability: An Information-Theoretic Approach
Measuring Intrusion Detection Capability: An Information-Theoretic Approach Guofei Gu, Prahlad Fogla, David Dagon, Boris Škorić Wenke Lee Philips Research Laboratories, Netherlands Georgia Institute of
CPC/CPA Hybrid Bidding in a Second Price Auction
CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper
The case for continuous penetration testing
The case for continuous penetration testing By Oliver Cromwell, OccamSec Knowing your risk In an ideal world, risk management for an organization would be based on complete knowledge of all the factors
Scaling-Up Urban Network Security Games with Graph Contraction
Scaling-Up Urban Network Security Games with Graph Contraction Hiroaki Iwashita Kotaro Ohori Hirokazu Anai Fujitsu Laboratories Ltd. Kawasaki 211-8588, Japan {iwashita.hiroak,ohori.kotaro,anai}@jp.fujitsu.com
Influence of Social Networks on Cyber Security
Influence of Social Networks on Cyber Security Kate Coronges, MPH, PhD Network Science Center (NSC) & Behavioral Sciences and Leadership (BS COL Ron Dodge, PhD, Information & Education Technology Alysse
Support Vector Machine (SVM)
Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
Single item inventory control under periodic review and a minimum order quantity
Single item inventory control under periodic review and a minimum order quantity G. P. Kiesmüller, A.G. de Kok, S. Dabia Faculty of Technology Management, Technische Universiteit Eindhoven, P.O. Box 513,
Reinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg [email protected]
A joint chance-constrained programming approach for call center workforce scheduling under uncertain call arrival forecasts
*Manuscript Click here to view linked References A joint chance-constrained programming approach for call center workforce scheduling under uncertain call arrival forecasts Abstract We consider a workforce
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Lecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems
myjournal manuscript No. (will be inserted by the editor) A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems Eduardo Álvarez-Miranda Ivana Ljubić Paolo Toth Received:
Sharing Online Advertising Revenue with Consumers
Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, [email protected] 2 Harvard University.
Supplement to Call Centers with Delay Information: Models and Insights
Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
THE HUMAN FACTOR AS A NECESSARY PART OF
Feature Roberto Puricelli, CISM, is a senior information and communications technology (ICT) security consultant at CEFRIEL, an innovation company of Politecnico di Milano. He has experience in various
Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
Mathematical finance and linear programming (optimization)
Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may
Using Markov Decision Processes to Solve a Portfolio Allocation Problem
Using Markov Decision Processes to Solve a Portfolio Allocation Problem Daniel Bookstaber April 26, 2005 Contents 1 Introduction 3 2 Defining the Model 4 2.1 The Stochastic Model for a Single Asset.........................
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
1 Portfolio mean and variance
Copyright c 2005 by Karl Sigman Portfolio mean and variance Here we study the performance of a one-period investment X 0 > 0 (dollars) shared among several different assets. Our criterion for measuring
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
Proximal mapping via network optimization
L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile
Stackelberg Security Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Milind
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE YUAN TIAN This synopsis is designed merely for keep a record of the materials covered in lectures. Please refer to your own lecture notes for all proofs.
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases Gerardo Canfora Bice Cavallo University of Sannio, Benevento, Italy, {gerardo.canfora,bice.cavallo}@unisannio.it ABSTRACT In
Message-passing sequential detection of multiple change points in networks
Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Revenue Management for Transportation Problems
Revenue Management for Transportation Problems Francesca Guerriero Giovanna Miglionico Filomena Olivito Department of Electronic Informatics and Systems, University of Calabria Via P. Bucci, 87036 Rende
The Multiplicative Weights Update method
Chapter 2 The Multiplicative Weights Update method The Multiplicative Weights method is a simple idea which has been repeatedly discovered in fields as diverse as Machine Learning, Optimization, and Game
Probabilistic Models for Big Data. Alex Davies and Roger Frigola University of Cambridge 13th February 2014
Probabilistic Models for Big Data Alex Davies and Roger Frigola University of Cambridge 13th February 2014 The State of Big Data Why probabilistic models for Big Data? 1. If you don t have to worry about
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Presented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Reinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg [email protected]
Principle of Data Reduction
Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then
Computing Near Optimal Strategies for Stochastic Investment Planning Problems
Computing Near Optimal Strategies for Stochastic Investment Planning Problems Milos Hauskrecfat 1, Gopal Pandurangan 1,2 and Eli Upfal 1,2 Computer Science Department, Box 1910 Brown University Providence,
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
10-601. Machine Learning. http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html
10-601 Machine Learning http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html Course data All up-to-date info is on the course web page: http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html
Less naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:[email protected] also CoSiNe Connectivity Systems
Some Research Directions in Automated Pentesting
Carlos Sarraute Research Directions in Automated Pentesting 1/50 Some Research Directions in Automated Pentesting Carlos Sarraute CoreLabs & ITBA PhD program Buenos Aires, Argentina H2HC October 29/30,
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Persuasion by Cheap Talk - Online Appendix
Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
