Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
1 Upstream Intelligence Andrew P. Largent Indiana University of Pennsylvania, Department of Computer Science COSC 480 Seminar on Technical Topic Dr. Charles Shubra Indiana, PA 15705 SID: 02137623 Date: 3/18/11 2 Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence of a threat. UI quantitatively identifies IPs and other networks which threaten online assets, no matter the context, for instance classified data, personal information, business information or intellectual property. UI is a source of information past ISP networks and other services provider’s perimeters and deals with the lowest levels of information on the Internet loosely referred to as “no man’s land”. UI help to identify threats on the Internet. UI is a very powerful security tool, with the Cyber security Act of 2009 and the Nation Broadband Plan from the Federal Communication Commission in 2010, adding a new level of security to the internet and better Information Assurance for ISPs and other providers. UI was developed and deployed with the goal of significant asset recovery of network bandwidth, but asset recovery is just the starting point of UI projected potential. “UI consists of proactive and accurate identification of compromised devices and networks on large scales in real time.” – Macaulay With the evolving threats and threat agents elevating potential risks breeds the new for new security capabilities, which is the driving force behind further development of UI. Such threats include some of the most successful crimes on the Internet: identify theft, credit card and banking fraud, spamming, phishing and DOS attacks to name a few. With UI, the information gathered is that of the threat agents and targeted assets rather than malware or programs resulting in a faster reaction time to threats. In the later 1990’s into the early 2000’s malware developers watched as there creation destroyed data and systems throughout the networks, and these developers took pride in their work knowing that the information technology professional were ill equipped and unprepared to handle such threats. Since then the selling of well developed malware exploitation, had pushed the coders underground sharing 3 less and less code with the best code being sold at a high price. UI adds a new layer to an enterprise architecture schema, making it much more secure. UI represents a new layer of security for all organizations not matter the size, adding new security capabilities possible when introduced to preexisting security architecture. With the fundamental “defense in depth” concept, will give an added advantage when applying UI the in foundation of the defense. UI provides two enhancements to the defense-in-depth design, the first being, UI extends the supported enterprise perimeter by identifying threats before they hit said perimeter, allowing for proactive actions using existing security layers. But I would like to stress the UI was not created with the purpose of counter-attacking. Such actions could inflect substantial injury to legitimate individuals and devices that are essentially inclusive victims. UI was developed for defensive and self-preservation as the primary objective. UI is a critical way to maintain networks integrity against threat agents with no concern for the network. In conclusion the value and intelligence possible in UI is largely unknown and untapped at the present, which leaves me to believe further development into better real-time systems for info/intel sharing to identify threats and threatened assets should be the course of the research on this topic. Discussion Questions Does UI have any mechanism to identify similar threats originating from different IP addresses (e.g. attacks via proxy)? 4 Not actually having firsthand knowledge of the intimate systems which handle the UI, I do not to presume to know the answer to this question, but if I had to take an educated guess I would hope that the development of the systems which deploy this technique would have multiple functions to it. With the fast pace advancements in technology, can we really say we are secure? I would say it depends of your personal ideology of secure, but as it relates to UI… alone UI would not provide proper security, but when added to existing security layers UI enhances the systems security ten-fold. How does upstream Intelligence incorporate itself within the security layers of a network? UI stand as a vanguard at the front lines of any security network giving the network time to react to a threat properly. Because of the rapid development of new attacks, do think UI will ever be able to truly protect a system? If not, is the return on investment enough to continue developing UI. Since UI looks at the threat agents and the threatened assets rather than the threats themselves I don’t see a problem with the advancements in new attacks, that problem will be reserved for the existing security layers on the system. I would have to say yes, continued development into further UI capabilities will greatly help the field of Information Assurance. 5 Will ISP’s ever be liable for attacks they might have been able to potentially prevent? I doubt that ISPs will ever be legally liable for such a situation, for the reason it would be hard to prove without a federal inquiry investigation into the situation. Do you think it is wise to strike back when dealing with cyber threats? I don’t truly get the drawback to using UI to counter attack, I can see the implications to such a situation, like the saying you can’t fight fire with more fire, but then again that saying in not true also, because fire-fighter use fire all the time to fight fires with, in order to use up all the oxygen and to move the fire in the direction they want so that they can control the fire. So, in the sense of control I can’t see the harm in using information to strike back at a threat agent. Do you believe using upstream intelligence to preemptively attack cyber-threats is even plausible on foreign soil? With our armed forces already allocating resources in so called “cyber warfare” , I could definitely see the government using such techniques to give them an edge in fighting the “good fight”. 6 Research reaction Learning about this ever evolving technique has cemented my interest in my field and further peeked my also ever evolving interest in Information Assurance. I look forward to reading future developments in this topic. If I was to propose research into this topic, I would push the research to look further into the optimization of the real-time acquisition of threats and threatened assets. Works cited Cybersecurity Act 2009- http://www.govtrack.us/congresss/billtext.xpd?bill=$111-773 Federal Communications Commission, National Broadband Pla: Connecting America, 2010http://www.broadband.gov/ Bell Canada Q4 2009 Macaulay, Tyson IAnewsletter- Vol 13 No 3- Summer 2010- http://iac.dtic.mil/iatac