Computer security practices are stuck in a time when the lone analyst was enough to solve the world's problems. Unfortunately, this has not been the case since the Morris worm of 1988. Yet, security analysts are still reliant on one-off tools, stove-piped processes, and immature methods with the end goal being a signature or an Indicator of Compromise for a single event. Sadly, this is a reactive process that takes months, while malicious actors move from victim A to victim B in less than 24 hours. As such, it should be no surprise that major incidents are regular news stories and 20% of companies report a major incident every year.
This dissertation explores how to break the current paradigm in computer security. As such, this work takes the approach that defensive methods must evolve to empower analysts to function across the Intelligence Cycle and pool the collective knowledge and resources of the community together. Specifically, we seek to change how the security community approaches the challenges of investigating malicious activities and generating defensive mitigation actions. In doing so, we provide the technical concepts required and guide how the analytics of malicious activities should be approached. After all, it is the process and the philosophy that matters most. To help guide achieving these goals, we develop an architecture that allows analysts to perform large-scale analysis using any object type. We then expand the architecture to create a new model for sharing and collaboration. This model allows analysts to develop a global perspective and assess threats as a collective whole. To emphasize that the concepts presented in this dissertation can apply to the real world, we then present a working prototype. This prototype has performed complex investigations and enabled active mitigation operations. Finally, we exemplify the power of the approach this dissertation prescribes by demonstrating these methods. In doing so, we reveal a hidden aspect of the PE32 file type and create two triage methods that perform rapid similarity matching and fingerprint the actor's build environment.
«
Computer security practices are stuck in a time when the lone analyst was enough to solve the world's problems. Unfortunately, this has not been the case since the Morris worm of 1988. Yet, security analysts are still reliant on one-off tools, stove-piped processes, and immature methods with the end goal being a signature or an Indicator of Compromise for a single event. Sadly, this is a reactive process that takes months, while malicious actors move from victim A to victim B in less than 24 hou...
»