52
Holistic Security Peter Cochrane cochrane.org.uk University of Singapore 17 November 2017

Holistic security

Embed Size (px)

Citation preview

Page 1: Holistic security

Hol ist ic

Security

Peter Cochranecochrane.org.uk

University of Singapore 17 November 2017

Page 2: Holistic security

what we know for sure

Attacks are escalatingThe Dark Side is winningThe attack surface is increasingCyber disruption costs are growingCompanies do not collaborate and shareThe attackers operate an open marketAll our security tools are reactiveAttacker rewards are on the upPeople are the biggest riskThere are no silver bullets

It is time to rethink our strategy and solution space

More of the same butbetter & faster will not

change the game…

…we have to think anew-get out of the boxand do something verydifferent !

Page 3: Holistic security

CYBER warfare A new and rea l l y b i g game changer

“The Amer ican Mi l i tary can no longer protect the nat ion”

Page 4: Holistic security

CY B E R war far e COST Pub l i shed numbers vary w ide l y - a l l we can say i s the cos t i s b i g and ge t t ing b i gger year on year

Top 10 economies on l y

Page 5: Holistic security

CY B E R war far e COST Pub l i shed numbers vary w ide l y - a l l we can say i s the cos t i s b i g and ge t t ing b i gger year on year

Top 10 economies on l y

Al l N ati on s are

Payi n g a pri ce

Page 6: Holistic security

THE B IG P ICTURECyber security is no longer contained

The Dark Side are winning because they are 100% committed and see this war as total; a much wider conflict than CYBER alone…

They are far more integrated and sharing - than we are and operate as a virtualised workforce driven by money and evil intent…

We do not anticipate their innovation, tactics, tools, attacks, and we don’t think as they do…we are always on the back foot!

We need to:

Page 7: Holistic security

Scale & ComplexityBeyond human abilities across too many fronts

Physical AND&&Cyber

are integrateD

Page 8: Holistic security

Relat ionsh ipS

Criminals

T h e D a r k S i d e o f T h e F o r c e !

Rogue States

Hackers

Pol it icos

Terrorists

Page 9: Holistic security

responsibilityPeople have no security abilities

And why should they ? It is not their problem ! They are just users and victims of very poor design and a lack of support

Industry needs to step up to theplate; take control ; automate &

del iver turnkey solut ions.They sold the products

and services: andshould ensure al loperate safely &

problem free!

Page 10: Holistic security

Dominated by Government

Forces

Government, Military, Industry, White Hats, General Population

Warfare continues to rapidly evolve,and is now total, embracing: PoliticsMedia, Infrastructure, Institutions,Financial Systems, Intel Agencies,Industry, Banks,Government, Homes,Appliances, Health Care,Emergency Services, Defence,Military, Transportation Systems,Farming, Food Production, Logistics,Networks, Devices, Hardware,Hardware, Software…+++

theatres of warNo longer a so l e m i l i ta ry p re se rve

AIRSEALAND

SPACECYBERCYBER

Page 11: Holistic security

CYBER EMBRACEAll peoples & all things in the loop

Autonomous Entities Intelligences Computers Networks Electronic Electrical Mechanical Mankind

PopulationMan

and

Man

/Mac

hine

Mad

e T

hing

s

Humans Are The

Minor Players

Cyber is now a part of everything we do and own; what we are - and there are now far more machines than people

Page 12: Holistic security

ATTAC K S U R FAC E We a re c o m p o u n d i n g o u r p ro b l e m s

I N T E R N E T

M O B I L I T Y

I O T

A n d , M O R E :U s e r s D e v i c e s S e r v i c e s M o b i l i t y N e t w o r k s B r o a d c a s t Soc ia l Nets C o m p l e x i t y e C o m m e rc e A p p l i c a t i o n s Tr a n s a c t i o n s C o n n e c t i v i t y O p e n A c c e s s D i g i t a l i s a t i o n I n f r a s t r u c t u r e G ro w i n g Re w a rd s + + + +

T h e t a r g e t i s g ro w i n g !

Page 13: Holistic security

WHO ARE THEYAnd their pr imary occupat ion ?

Possible Recruit

Terrorist Trainee

CIA Agent

Rogue Gov Spy

Black Hat

Terrorist

Criminal

Terrorist Recruitor

White Hat

Hacker

Pol ice

Security Agent

CEO/CIO

Social Engineer

Cyber Bul ly Malware

BreederSecurity

Consultant

Page 14: Holistic security

WHO ARE THEYAnd their pr imary occupat ion ?

Possible Recruit

Terrorist Trainee

CIA Agent

Rogue Gov Spy

Black Hat

Terrorist

Criminal

Terrorist Recruitor

White Hat

Hacker

Pol ice

Security Agent

CEO/CIO

Social Engineer

Cyber Bul ly Malware

BreederSecurity

Consultantp e o p l e a r e n o t j u s t b a d

a n d g o o d i n o n e d o m a i n

t h e i r h a b i t u a l i t i e s a r e

p e r m i a t e a l l d o m a i n s

W H A T A R E T H E I R D E V I C E S

c o m m u n i c a t i n g / h i d i n g

T o w h o m a n d w h a t a r e

t h e y c o m m u n i c a t i n g

Page 15: Holistic security
Page 16: Holistic security
Page 17: Holistic security

What is th is ?A DDoS attack, or something more

Main Event ? Decoy ? Masking ? Diversion ?

Tunnel set up ? Infiltration ? Intel Ops ? Implant ? Theft ? Tests ? +++

Page 18: Holistic security

AXIOMATICM a c h i n e s d o m i n a t e

Number of Machines >> Number of People

They are by far the biggest communicators

Their sensory capabi l i t ies growing

Their intel l igence is growing

T h e y a r e a p a r t o f u s

We are a part of them

We enjoy an irreversible mutual dependency

“I th ink we can safe ly assume that they are col lect ing vast amounts of data and information…and we do not understand the s igni f icance of most of i t”

Page 19: Holistic security

AXIOMATICP r o b l e m s o l v i n g

“ O u r b i g g e t s a n d m o s t c o m p l e x c y b e rs e c u r i t y p ro b l e m s c a n n o t b e s o l ve d b y

a n a l o g u e m e t h o d s , a n d t h a t a l m o s tc e r t a i n l y i n c l u d e s t h e h u m a n m i n d ”

Page 20: Holistic security

AXIOMATICP r o b l e m s o l v i n g

“ O u r b i g g e t s a n d m o s t c o m p l e x c y b e rs e c u r i t y p ro b l e m s c a n n o t b e s o l ve d b y

a n a l o g u e m e t h o d s , a n d t h a t a l m o s tc e r t a i n l y i n c l u d e s t h e h u m a n m i n d ”

A

AI AND Machine Help

has become vital

Page 21: Holistic security

NEEDLE IN A NEEDLE STACKA multi-tool challengePeople Surveillance Communications Employments Associations Individuals Purchases Networks Habits Social Travel Work +++

Device/s Surveillance Other Device Connect

Net Node Connect Social Networks

eAssoc iat ions eConnections

ePurchases Locations

Habits Travel eMail TXTs Calls Web +++

A

Habits+Activities

GIVE VITAL CLUES

Page 22: Holistic security

WHAT WE NOW NEED ?An essentials shopping l ist is reasonably short

Global monitoring and shared s ituat ional awareness

Cooperative environments on attacks and solut ions

Universal sharing of identi f ied attacks/developments

Address c loaking & decoy customer s ites/net nodes

Behavioural analys is of networks, devices, people

To continue and expand al l establ ished ef forts

Auto-Immunity for a l l devices including IoT

Secure wireless channels - inv is ib le s ignals

Page 23: Holistic security

Lets exaM INE THREEThe grey items have been addressed elsewhere

Global monitoring and shared s ituat ional awareness

Cooperative environments on attacks and solut ions

Universal sharing of identi f ied attacks/developments

Address c loaking & decoy customer s ites/net nodes

Behavioural analys is of networks, devices, people

To continue and expand al l establ ished ef forts

Auto-Immunity for a l l devices including IoT

Secure wireless channels - inv is ib le s ignals

Page 24: Holistic security

Sociology of things

The sociology of things is not understood and has yet to be studied- and it is digital!

RelationshipsThe keys to the security kingdomand behaviors

Page 25: Holistic security

b e h av i o u ra l a n a lys i sPeople, devices, networks, components, things are habitual

Habituality identifies us

Any deviation indicates some form of change

Page 26: Holistic security

b e h av i o u ra l a n a lys i sNetwork data shows a marked increase in activ ity

222120191817161514131210987654

Attack generated data

Normal data

Page 27: Holistic security

Auto-immunityMirrors biological forebears

Applied everywhere 24 x 7 ICs ISPs WiFi Hubs LANs Cards Traffic Servers Circuits Devices Internet Networks

Organisations Companies

Platforms Groups People Mobile

Fixed

Page 28: Holistic security

Broadcasting Malware

Responding with updated

protection Wider Network Updated

Latest Solution Update

Dynamic isolation of infected devices and components

leading to repairA mix o f c l ean and in fec tedAuto-immunity

Page 29: Holistic security

A Multiplicity of channelsAttack detection/exposure/thwarting using access diversity

BlueTooth Short Range Device to Cloud Device to Device

WiFi, WiMax Medium Range WLAN/Cloud

Integrated and intelligent security systems embedded

into all products and componentsZigBe/Other ?? Car-to-Car Direct Communications

Defence opportunities in channel/device/system diversity

A wide plurality of channel detection and protection

Attacks almost never isolated or single sourced

Not restricted to single channel/attempt

Secure attack and infection isolation

Diverse immunity/support access

Distributed info sharing

GEO info location

3, 4, 5 G Long Range

Device to Net Device to Cloud

SatCom Broadcast

Page 30: Holistic security

Auto- immun ityF i g h t i n g f i r e w i t h f i r e

Page 31: Holistic security

Infinite IoT WirElesSSans channels , bands & regulat ion

“ T h e r e i s n o b a n d w i d t h c r i s i s , a n adherence to the past , l imi ted th inking, bad design and engineer ing….we have to reth ink the day and not be constra ined by the past”

Page 32: Holistic security

Where it all startedFork lift radio - analogue - long distances - lots of power

CW, AM, FM, SSB+++

P2P Fixed, Broadcast+++

LW, MW, SW, VHF, UHF+++

Terrestrial, Maritime, Airborne+++

~30Bn fixed and mobile broadcast radio & TV receivers dominate followed by simplex

voice transceivers

Page 33: Holistic security

Big cells and n x1000s of towersFast forward

~7Bn live devices on 3/4G connected to a global net of duplex voice & data comms

• Digital modes only

• Personal mixed use and traffic

• Static base stations dominate

• Terrestrial concentration

• Large cells <20km

Page 34: Holistic security

Does e ve r y th i ng, bu t bad l yTHE BIG F IX ?

5g• Replaces optical fibre • Outguns 3 & 4G • Gbit/s everywhere

• Will dominate the IoT • +++++ • Cooks a chicken • Improves your sex l ife….

Page 35: Holistic security

ObservationsI t i s a m i rac l e i t a l l wo rk s

Protocols very inefficient We avoid interference by dynamic juggling!

The spectrum shortage is an il lusion We seldom use more than 20% of the available space

5G unlikely to be a big player It cannot ful ly service the IoT

We need more than incrementalism More bands, channels, modulation and coding schemes are not enough

Page 36: Holistic security

n e w d i r e c t i o n SFrom connected people to connected things

People ~10Bns

Traffic ~1 Bn

Goods ~100Bns

Components ~1 Tn IoT

Page 37: Holistic security

E n e r g y l i m i t a t i o n SWe cannot realise such a future using our current approach

Internet and connected devices ~ 10% of all energy generated

What would 50, 250 or 1000Bn IoT devices demand ?

We have to get down from mW to µW, nW and pW

This demands ‘simplicity’ of processing and communications

Page 38: Holistic security

N e w M o d e sMore things linking off net than on

Most THINGS will never connect to the internet

THINGS will want to network and connect with other THINGS

The IoT is entirely evolutionary and not just revolutionary

New sporadic networks and associations will occur

Page 39: Holistic security

one size fits all - not!We are going to need a multiplicity of technologies

Cost Per Unit ~ 0 - 20 £, $, €

Size of Units ~ 1 - 50 mm3

Power Used ~ pW - mWSingle Chips Rule

Page 40: Holistic security

Cont i n u e tW eak i n g ?This heritage/thinking cannot possible get us there

Page 41: Holistic security

The Illusion of scarcityWhy do we do th i s - i t i s large ly legacy th ink ing

Page 42: Holistic security

The Illusion of scarcityWhy do we do th i s - i t i s large ly legacy th ink ing

Actuall

y the

spec

trum is

mostl

y unu

sed!

Page 43: Holistic security

A dense london location~50k WiF i nodes wi th in a 1km rad ius o f L iverpoo l St

Page 44: Holistic security

New OpportunitiesHigh loss i s a short d i s tance/ reuse +++

God Given Spat ia l F i l ters

Status Quo Leave wel l

a lone

New Terr i tory and new

opportunit ies

Cont inues untouched

Al l modulat ion schemes from the past +new

New modulat ionschemes & modesinc luding hyperDirect SequenceSpread Spectrum

Page 45: Holistic security

The Illusion of scarcityWhy do we do th i s - i t i s large ly legacy th ink ing far too complex & expensiveU n f i t f o r t h e I o T p u r p o s e - e s p e c i a l l y a t 3 0 - 3 0 0 G H z

Page 46: Holistic security

New Opportun it i esHigh loss idea l for short d i s tance/ reuse +++

Direct Sequence Spread Spectrum

HYPER Direct Sequence Spread Spectrum

Page 47: Holistic security

S/N dB

BW Hz

Duration

T seconds

Volumetric representation of S/N, BW and Time Claude Shannon 1945/46

I = B.T log2(1 + k.S/N)

I ~ B.T.K.S/NdB

vv

Back to basics

k.S/N >> 1

Page 48: Holistic security

The same information transmitted in 3 different modes exploiting S/N, BW and T

S/N dB

BW Hz

Duration

T seconds

degrees of freedom

Page 49: Holistic security

S/N dB

BW Hz

Duration

T seconds

In the Extreme

‘Waste Bandwidth’ to push the Signal Below the Noise

FiltersCoding

ModulationTiming Recovery

Amplifiers & Mixers

JitterPhase NoiseDoppler ShiftFrequency StabilityMulti-Path Propagation

Negated

Page 50: Holistic security

BW ~ 500MHz

All digital no analogue elements - mixers, amplifies, filtersUWB ON AFTERBURNERS

From UWB

To HWB Hyper Wide Band

BW ~ 50GHz

SIGNAL CODING/Error Correction => Bit Counting/Averaging

1bit/Hz

0.01bit/Hz

Page 51: Holistic security

Antennas spanning huge

frequency ranges are a non-

trivial problem…and whilst

fractal antennas are seen to

be (theoretically) the holy grail,

no one has yet succeeded in

realising fully workable designs

Challenge

Page 52: Holistic security

For the usa army

The cyber war HAS

becomE Just war

Thank Youwww.cochrane.org.uk