• DocumentCode
    1785263
  • Title

    Agent-based trace learning in a recommendation-verification system for cybersecurity

  • Author

    Casey, William ; Wright, Edward ; Morales, Jose Andre ; Appel, Michael ; Gennari, Jeff ; Mishra, Bud

  • Author_Institution
    Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA
  • fYear
    2014
  • fDate
    28-30 Oct. 2014
  • Firstpage
    135
  • Lastpage
    143
  • Abstract
    Agents in a social-technological network can be thought of as strategically interacting with each other by continually observing their own local or hyperlocal information and communicating suitable signals to the receivers who can take appropriate actions. Such interactions have been modeled as information-asymmetric signaling games and studied in our earlier work to understand the role of deception, which often results in general loss of cybersecurity. While there have been attempts to model and check such a body of agents for various global properties and hyperproperties, it has become clear that various theoretical obstacles against this approach are unsurmountable. We instead advocate an approach to dynamically check various liveness and safety hyperproperties with the help of recommenders and verifiers; we focus on empirical studies of the resulting signaling games to understand their equilibria and stability. Agents in such a proposed system may mutate, publish, and recommend strategies and verify properties, for instance, by using statistical inference, machine learning, and model checking with models derived from the past behavior of the system. For the sake of concreteness, we focus on a well-studied problem of detecting a malicious code family using statistical learning on trace features and show how such a machine learner - in this study a classifier for Zeus/Zbot - can be rendered as a property, and then be deployed on endpoint devices with trace monitors. The results of this paper, in combination with our earlier work, indicate the feasibility and way forward for a recommendation-verification system to achieve a novel defense mechanism in a social-technological network in the era of ubiquitous computing.
  • Keywords
    formal verification; game theory; inference mechanisms; learning (artificial intelligence); pattern classification; recommender systems; statistical analysis; ubiquitous computing; Zeus/Zbot classifier; agent-based trace learning; cybersecurity; defense mechanism; dynamic checking; empirical analysis; endpoint devices; global properties; hyperlocal information; information-asymmetric signaling games; liveness hyperproperties; machine learner; machine learning; malicious code family detection; model checking; property verification; recommendation-verification system; safety hyperproperties; social-technological network; statistical inference; statistical learning; strategy mutatation; strategy publishing; strategy recommendation; trace features; trace monitors; ubiquitous computing; Games; Instruments; Kernel; Malware; Monitoring; Sociology; Statistics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-7328-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2014.6999404
  • Filename
    6999404