ASU part of 6-university initiative to defend against cyberattacks


|

In “The Art of War,” famed Chinese general Sun Tzu advised, “if you know the enemy and know yourself, you need not fear the result of a hundred battles.”

Along with five other universities, researchers from Arizona State University are bringing this age-old concept to digital battlefields to combat advanced persistent cyber threats and other forms of cyber malfeasance.

The project — titled "Realizing Cyber Inception: Towards a Science of Personalized Deception for Cyber Defense" — brings together experts in computer science, cybersecurity, game theory and cognition to conduct research on defending against cyberattacks by profiling the attackers. The work is supported by a $6.2 million Multidisciplinary University Research Initiative award, granted to the six partnering universities by the Army Research Office last month.

Nancy Cooke (pictured above, standing) explains the aim of the project in simple terms: “We’re trying to deceive the deceiver.” Cooke is a professor and human systems engineering graduate program chair and professor at the Polytechnic School, one of the six Ira A. Fulton Schools of Engineering.

As a cognitive psychologist, Cooke’s role in the project is to gather data on human behavior using her DEXTAR (Cyber Defense EXercises for Team Awareness Research) simulator. The lab, which seats six people, will simulate cyberattack and defense scenarios for participating graduate students that Cooke will use to gather data.

That data will go to researchers at Carnegie Mellon University, who in turn will create cognitive models of decision-making by attackers. Paired with a mathematical framework for modeling defenders and attackers in a cybersecurity environment, the cognitive models are used to develop examples of multilayered environments that can monitor attacks.

“What we’re doing is developing a personalized form of deception,” Cooke said. “We try to understand the attacker. Instead of a using a generalized honeypot, we specialize the offense against them, creating an environment in which they don’t know what’s real and what’s not.”

The types of attacks Cooke and her fellow researchers look to guard against have seen an uptick in recent years. For instance, in January, an assessment by the Office of the Director of National Intelligence concluded with high confidence that the Russian government interfered in the 2016 U.S. presidential election through hacking.

“These kind of attacks are dangerous because they start out personal but become persistent and pervasive,” said Cooke, citing the 2014 cyber attacks against JPMorgan Chase and Sony Pictures, both of which resulted in extended data and communication breaches.

“A lot can happen once they’re in the system, opening doors to espionage and threats to national security,” said Cooke.

The University of Southern California leads the project, with Milind Tambe, a professor of computer science, at the helm. Carnegie Mellon; the University of North Carolina, Chapel Hill; North Carolina State University; and the University of Texas, El Paso round out the partner institutions in addition to ASU.

“When the call went out for this, as it often happens, people at different universities started calling around to see if one another were interested,” said Cooke. “We thought our different skill sets would make for a good team, and evidently so did the ARO.”

This marks the third MURI award Cooke has been a part of, the previous two awarded by the Office of Naval Research and the Army Research Office. One examined macro-cognition in a naval setting and how to improve teamwork during operations, while the other studied situational awareness in cybersecurity.

Top photo: Professor Nancy Cooke works with a student in the Cyber Defense EXercises for Team Awareness Research simulator, known as DEXTAR, on ASU's Polytechnic campus. Photo by Jessica Hochreiter/ASU

More Science and technology

 

A computer illustration of a DNA helix with computer code and a fingerprint in the background

ASU forensics expert explains DNA tech being used in Guthrie investigation

It’s been more than 30 days since Nancy Guthrie disappeared from her Tucson, Arizona, home, and with little physical evidence pointing to a suspect, investigators have turned to an advanced forensic…

Three students work together on a laptop in a courtroom.

Digital crimes leave data trails; these students built a tool to help explain them

In a courtroom, truth often hinges on storytelling. But when that story involves hex values, file systems, packet captures or metadata time stamps, even the most seasoned judge can struggle to follow…

Four students sit together at a table and work on laptops.

From traffic systems to trustworthy AI, ASU students are solving problems the world can’t ignore

How do you trust artificial intelligence when it doesn’t know what it doesn’t know? How do you safely move computing systems trained in simulation into the real world, where mistakes carry real…