The Response Continuum

15
The Response Continuum Sergio Caltagirone ([email protected]) University of Idaho Deborah Frincke ([email protected]) Pacific Northwest National

description

The Response Continuum. Sergio Caltagirone ([email protected]) University of Idaho Deborah Frincke ([email protected]) Pacific Northwest National Laboratory. Previous Responses…. Clifford Stoll v. German Hackers (1986) - PowerPoint PPT Presentation

Transcript of The Response Continuum

Page 1: The Response Continuum

The Response Continuum

Sergio Caltagirone ([email protected])

University of Idaho

Deborah Frincke ([email protected])

Pacific Northwest National Laboratory

Page 2: The Response Continuum

Previous Responses… Clifford Stoll v. German Hackers (1986)

C. Stoll, “Stalking the Wiley Hacker” in Communications of the ACM, vol 31, 1998, pp. 484-497.

DoD v. Electronic Disturbance Theater (1998)http://archives.cnn.com/2000/TECH/computing/04/07/self-defense.idg/

Conxion v. E-Hippies (2000)http://www.nwfusion.com/research/2000/0529feat2.html

FBI v. Russian Hackers (2001) a.k.a. ‘Invita’ Casehttp://www.wired.com/news/politics/0,1283,47650,00.htm

Page 3: The Response Continuum

Where Is Everybody?

Page 4: The Response Continuum

Where Is Everybody?

Primary focus to reduce system vulnerability and/or accurately/rapidly detect misuse

Difficult to experiment with extreme or novel forms of response

Folded in as part of detection Response == Advocacy of Vigilantism No reason to study response since

detection cannot be done reliably

Page 5: The Response Continuum

Where We’re At…

Design Protect Detect Forensics?

Page 6: The Response Continuum

Where We Want To Be…

Design Protect Detect Respond Forensics

Page 7: The Response Continuum

Goals

Develop a framework to discuss response actions– Definition– Taxonomy– Summary of Challenges– Response Process Model

Page 8: The Response Continuum

Elements of a Definition Time-bound

– Subjective Purposeful

– Not for retribution or revenge, but to return to a previous secure state

Limited– Threat mitigation not elimination

Controllable and Deliberate Sequence of Actions Technologically Independent

Page 9: The Response Continuum

A Definition: Active ResponseAny action sequence deliberately performed

by an individual or organization between the time an attack is detected and the time it

is determined to be finished, in an automated or non-automated fashion, in order to mitigate the identified threat’s

negative effects upon a particular asset set.

Active does not modify response, but rather describes the state of the attack

Page 10: The Response Continuum

Taxonomy of Responses 8 Types

– No Action– Internal Notification– Internal Response– External Cooperative Response– Non-cooperative Intelligence Gathering– Non-cooperative ‘Cease and Desist’– Counter-Strike (Direct vs. Passive)– Preemptive Defense

Page 11: The Response Continuum

Challenges of Active Response Legal

– Civil, Criminal, Domestic, International Ethical

– Teleological, Deontological Technical

– Traceback, Reliable IDS, Confidence Value, Real Time

Risk Analysis– Measure ethical, legal risk effectively?

Unintended Consequences– Attacker Action, Collateral Damage, Own

Resources

Page 12: The Response Continuum

Response Process Model

Page 13: The Response Continuum

Future Work

Increased Public Discussion Competitive Co-Evolution to Determine

New Strategies Continue to Develop Response Models Increased Research in Response

Technologies and Approaches

Page 14: The Response Continuum

Conclusions

A Need for Response– More Discussion– Greater Understanding

A Definition Taxonomy Summary of Challenges Process Model

Page 15: The Response Continuum

Contact Information

Sergio Caltagirone

[email protected]

http://www.activeresponse.org