Detecting Nation State Cyberattacks with Classified Threat Sensors - - PowerPoint PPT Presentation

detecting nation state cyberattacks with classified
SMART_READER_LITE
LIVE PREVIEW

Detecting Nation State Cyberattacks with Classified Threat Sensors - - PowerPoint PPT Presentation

Detecting Nation State Cyberattacks with Classified Threat Sensors Dr. Steve Weis, Dr. Aloni Cohen, Dr. Amina Asim Dr. Stephen Weis Dr. Aloni Cohen Dr. Amina Asim Private companies must defend against foreign nations without access to


slide-1
SLIDE 1

Detecting Nation State Cyberattacks with Classified Threat Sensors

  • Dr. Steve Weis, Dr. Aloni Cohen, Dr. Amina Asim
slide-2
SLIDE 2
  • Dr. Stephen Weis
  • Dr. Aloni Cohen
  • Dr. Amina Asim
slide-3
SLIDE 3

Private companies must defend against foreign nations without access to classified threat intelligence.

slide-4
SLIDE 4

Private Computer Threat Detection Security Logs

Private Company Network

Cyber Attacker 🙃 ☠ 🙃 … Indicator of
 Compromise Private Logs ☠

The Information Sharing Challenge

slide-5
SLIDE 5

Private Computer Threat Detection Security Logs

Private Company Network

Cyber Attacker Classified Intelligence
 ☠ = 👏 🙃 ☠ 🙃 … Indicator of
 Compromise Private Logs ☠

The Information Sharing Challenge

Can private industry apply classified intelligence without leaking it?

slide-6
SLIDE 6

What if a classified threat sensor could apply classified intelligence to private company data?

slide-7
SLIDE 7

Private Computer Classifed Threat Sensor Security Logs

Private Company Network

☠ Cyber Attacker Classified Intelligence
 ☠ = 👏 🙃 ☠ 🙃 … 🔓 Encrypted Intelligence Indicator of
 Compromise Private Logs ☠

Classified Threat Sensors

slide-8
SLIDE 8

CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment

slide-9
SLIDE 9

Secure enclaves are safe spaces to run your own software on someone else’s computer.

slide-10
SLIDE 10

Private Computer Secure Enclave

Private Data

Verification Service

Classified Unclassified

Classified Intelligence Open Source Code

Starting a Classified Threat Sensor

slide-11
SLIDE 11

Private Computer Secure Enclave

Private Data 1. Verify enclave is authentic

  • 3. Encrypted Intelligence
  • 5. Encrypted “Hit or Miss”

Verification Service

Classified Unclassified

Encryption Service Classified Intelligence

  • 4. Search
  • 2. Encrypt

Searching for Threats in Private Data

slide-12
SLIDE 12

Private Computer Secure Enclave

Private Data 1. Verify enclave is authentic

  • 3. Encrypted Intelligence
  • 5. Encrypted “Hit”

Verification Service

Classified Unclassified

Encryption Service Classified Intelligence

  • 4. Search
  • 2. Encrypt

Analyst

  • 6. “Hit”
  • 7. “You have a problem…”

Employee

Responding to Detected Threats

slide-13
SLIDE 13

Private Computer Secure Enclave 🔒
 ☠? Security Logs

Private Company Network

☠ Cyber Attacker Classified Intelligence
 ☠ = 👏 🙃 ☠ 🙃 … 🔓

CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment

Encrypted Intelligence Indicator of
 Compromise Private Logs ☠

slide-14
SLIDE 14

Five Phase Plan

Phase 1 Open Source Proof of Concept Phase 2 Industry-to-Industry Trial Deployment Phase 3 Government-to-Government Trial Deployment Phase 4 Government-to-Industry Unclassified Sharing Phase 5 Government-to-Industry Classified Sharing

slide-15
SLIDE 15

Call for Funding

  • Call for $150,000 grant to develop a classified threat sensor.
  • Funding will cover 2 student developers for 1 semester plus a part time PI.
  • Working prototype should be delivered in 6 months.
  • All software will be available under open source license.
slide-16
SLIDE 16

Thanks to Generous Supporters

slide-17
SLIDE 17

CANAREE: Classified Analysis of Network Attacks in a Restricted Execution Environment For more information, please visit:
 https://saweis.net/canaree