via UT Dallas
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.
The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
UT Dallas researchers presented a paper on their work, “Improving Intrusion Detectors by Crook-Sourcing,” at the annual Computer Security Applications Conference in December in Puerto Rico. They presented another paper, “Automating Cyberdeception Evaluation with Deep Learning,” in January at the Hawaii International Conference of System Sciences.
DEEP-Dig advances a rapidly growing cybersecurity field known as deception technology, which involves setting traps for hackers. Researchers hope that the approach can be especially useful for defense organizations.
“There are criminals trying to attack our networks all the time, and normally we view that as a negative thing,” said Dr. Kevin Hamlen, Eugene McDermott Professor of computer science. “Instead of blocking them, maybe what we could be doing is viewing these attackers as a source of free labor. They’re providing us data about what malicious attacks look like. It’s a free source of highly prized data.”
There are criminals trying to attack our networks all the time, and normally we view that as a negative thing. Instead of blocking them, maybe what we could be doing is viewing these attackers as a source of free labor. They’re providing us data about what malicious attacks look like.”
Dr. Kevin Hamlen, Eugene McDermott Professor of computer science
The approach aims to solve a major challenge to using artificial intelligence for cybersecurity: a shortage of data needed to train computers to detect intruders. The lack of data is due to privacy concerns. Better data will mean better ability to detect attacks, said Gbadebo Ayoade MS’14, PhD’19, who presented the findings at the recent conferences.
“We’re using the data from hackers to train the machine to identify an attack,” said Ayoade, now a data scientist at Procter & Gamble Co. “We’re using deception to get better data.”
Hackers typically begin with their simplest tricks and then use increasingly sophisticated tactics, Hamlen said. But most cyberdefense programs try to disrupt intruders before anyone can monitor the intruders’ techniques. DEEP-Dig will give researchers a window into hackers’ methods as they enter a decoy site stocked with disinformation. The decoy site looks legitimate to intruders, said Dr. Latifur Khan, professor of computer science at UT Dallas.
“Attackers will feel they’re successful,” Khan said.
Governmental agencies, businesses, nonprofits and individuals face a constant threat from cyberattacks, which cost the U.S. economy more than $57 billion in 2016, according to a report to the White House from the Council of Economic Advisers.
As hackers’ tactics change, DEEP-Dig could help cybersecurity defense systems keep up with their new tricks.
“It’s an endless game,” Khan said.
While DEEP-Dig aims to outsmart hackers, is it possible that hackers could have the last laugh if they realize they have entered a decoy site and try to deceive the program?
Maybe, Hamlen said. But that possibility does not worry him.
“So far, we’ve found this doesn’t work. When an attacker tries to play along, the defense system just learns how hackers try to hide their tracks,” Hamlen said. “It’s an all-win situation — for us, that is.”
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
- Joe Biden's Peloton bike may pose cybersecurity risk, experts warnon January 21, 2021 at 5:56 am
Joe Biden’s fitness regime may potentially cause an unexpected headache for security services charged with keeping the new president safe in the White House, with his Peloton exercise bike viewed by ...
- Here are all the companies in Tampa Bay Wave's inaugural cybersecurity cohorton January 21, 2021 at 4:10 am
A new cohort focused on boosting cybersecurity startups has officially launched, thanks to the help of cybersecurity giants in Tampa Bay. The Tampa Bay Wave's inaugural CyberTech\| ...
- Ransomware is now the biggest cybersecurity concern for CISOson January 20, 2021 at 8:58 pm
Phishing, account compromise and business email compromise attacks are all worries for organisations - but it's fear of ransomware attacks that is causing the biggest concern.
- The Cybersecurity 202: Biden nominees entering administration behind on big hackon January 20, 2021 at 9:46 am
Nomination hearings for President-elect Joe Biden's top security picks reveal gaps in knowledge about a massive government hack that could slow down the new administration's response plans. Avril ...
- Fired DHS cybersecurity head Chris Krebs says Trump should be convicted for inciting insurrectionon January 19, 2021 at 5:29 pm
Christopher Krebs, a longtime Republican and former head of the Cybersecurity and Infrastructure Security Agency, was fired by Trump over Twitter on Nov. 17. The move came just a few days after CISA ...
Go deeper with Google Headlines on:
Go deeper with Bing News on:
- What Every CEO Needs To Know About Supply Chain Cyberattackson January 21, 2021 at 6:20 am
After nearly a year of accelerated digital transformation, we are more dependent on data and software, and more interdependent for its security, than ever.
- Fight fire with fire: The services key to knocking out sophisticated cyberattackson January 20, 2021 at 11:39 pm
Modern organisations of all sizes can rest easy with Sophos Managed Threat Response (MTR) services, which offer 24/7 threat hunting, detection and response capabilities.
- Is the Real Estate Industry a Target for Cyberattacks?on January 20, 2021 at 3:06 pm
No industry is immune to privacy and cybersecurity risks, and the real estate industry is no exception. Those in the real estate industry can protect against cyberattack by understanding the risks and ...
- Recorded Future scours the Web for potential cyberattacks and terrorist activity. Business is boomingon January 19, 2021 at 9:21 pm
Think of Recorded Future as a mashup of Google and Jack Ryan — a search engine focused on nasty stuff transpiring or being planned around the world.
- State Capitols Brace for Cyberattacks Ahead of Inaugurationon January 19, 2021 at 1:01 pm
After laptops were stolen during a riot at the U.S. Capitol Jan. 6, state capitols across the nation are preparing themselves for the possibility of cyberattacks.