Title :
Agent-based trace learning in a recommendation-verification system for cybersecurity
Author :
Casey, William ; Wright, Edward ; Morales, Jose Andre ; Appel, Michael ; Gennari, Jeff ; Mishra, Bud
Author_Institution :
Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA
Abstract :
Agents in a social-technological network can be thought of as strategically interacting with each other by continually observing their own local or hyperlocal information and communicating suitable signals to the receivers who can take appropriate actions. Such interactions have been modeled as information-asymmetric signaling games and studied in our earlier work to understand the role of deception, which often results in general loss of cybersecurity. While there have been attempts to model and check such a body of agents for various global properties and hyperproperties, it has become clear that various theoretical obstacles against this approach are unsurmountable. We instead advocate an approach to dynamically check various liveness and safety hyperproperties with the help of recommenders and verifiers; we focus on empirical studies of the resulting signaling games to understand their equilibria and stability. Agents in such a proposed system may mutate, publish, and recommend strategies and verify properties, for instance, by using statistical inference, machine learning, and model checking with models derived from the past behavior of the system. For the sake of concreteness, we focus on a well-studied problem of detecting a malicious code family using statistical learning on trace features and show how such a machine learner - in this study a classifier for Zeus/Zbot - can be rendered as a property, and then be deployed on endpoint devices with trace monitors. The results of this paper, in combination with our earlier work, indicate the feasibility and way forward for a recommendation-verification system to achieve a novel defense mechanism in a social-technological network in the era of ubiquitous computing.
Keywords :
formal verification; game theory; inference mechanisms; learning (artificial intelligence); pattern classification; recommender systems; statistical analysis; ubiquitous computing; Zeus/Zbot classifier; agent-based trace learning; cybersecurity; defense mechanism; dynamic checking; empirical analysis; endpoint devices; global properties; hyperlocal information; information-asymmetric signaling games; liveness hyperproperties; machine learner; machine learning; malicious code family detection; model checking; property verification; recommendation-verification system; safety hyperproperties; social-technological network; statistical inference; statistical learning; strategy mutatation; strategy publishing; strategy recommendation; trace features; trace monitors; ubiquitous computing; Games; Instruments; Kernel; Malware; Monitoring; Sociology; Statistics;
Conference_Titel :
Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4799-7328-6
DOI :
10.1109/MALWARE.2014.6999404