310 likes | 318 Views
Delve into empirical studies on cybersecurity deterrence and educational outreach programs fostering cyber awareness. Learn about ACES honors program, summer camps, Saturday workshops, and research findings on deterrence in cyberspace. Discover the challenges in identifying, locating, and prosecuting cyber attackers. Uncover the efforts to enhance cybersecurity education and promote deterrence strategies in today's digital landscape.
E N D
Is Deterrence Working? Some Empirical Studies in Cybersecurity Michel CukierDirector, Advanced Cybersecurity Experience for Students Associate Director for Education, Maryland Cybersecurity CenterAssociate Professor, Reliability Engineering
Outline • Education • Outreach • ACES • Research • Deterrence: empirical studies
Outline • Education • Outreach • ACES • Research • Deterrence: empirical studies
Summer Camps • Cyber Defense Training Camp: • Intermediate level one-week summer program for high school boys/girls (rising juniors/seniors) • Collaboration with National CyberWatch Center • Participants learn about system administration, operating systems, networking, programming and more • Includes a campus tour, guest speakers, and field trips to the NSA Cryptologic Museum and Industry Leaders such as Northrop Grumman and Lockheed Martin
Summer Camps • CyberSTEM Camp: • One-week commuter summer program for middle school (incoming 7th/8th grade) girls • Collaboration with National CyberWatch Center • Participants learn about programming using Scratch, digital forensics, gaming and modeling, cryptography, and cyber safety • Includes a campus tour, guest speakers, and field trips to the NSA Cryptologic Museum and Industry Leaders such as Northrop Grumman and Lockheed Martin
Summer Camps • Intermediate CyberSTEM Camp: • One-week commuter summer program for middle school (incoming 9th/10th grade) girls • Collaboration with National CyberWatch Center • Participants learn about programming using MicroWorlds and Python, gaming and modeling, digital forensics, cyber safety, cryptography, and careers in cybersecurity • Includes a campus tour, guest speakers, and field trips to the NSA Cryptologic Museum and Industry Leaders such as Northrop Grumman and Lockheed Martin
Saturday Cybersecurity Awareness Workshops • Saturday Awareness Workshop for Middle School Girls • Interactive learning and mentoring experience for girls in grades 6-8 who are interested in technology, computers, and cybersecurity • Undergraduate students lead workshops in various computer and technology related topics • Goal is to have young women feel confident and competent when using technology • Topics include internet privacy, computer safety, password protection, cryptography, and lock-picking
Saturday Cybersecurity Awareness Workshops • Saturday Awareness Workshop for 4th and 5th Graders • Interactive learning and mentoring experience boys and girls in grades 4-5 who are interested in technology, computers, and cybersecurity • Undergraduate students lead workshops in various computer and technology related topics • Goal is to introduce young students to STEM topics and spark their interest in computers and technology • Topics include public key encryption, information hiding, networking, and an introduction to the concept of programming languages
Outline • Education • Outreach • ACES • Research • Deterrence: empirical studies
ACES Overview • First four year honors undergraduate program in cybersecurity • Launched with the help of a major gift from Northrop Grumman • Features a multidisciplinary approach to cybersecurity • Two linked academic programs in a 2 + 2 model • Apply during sophomore year to continue into ACES II ACES I Freshmen & Sophomores Living-Learning Program First cohort entered Fall 2013 ~75 students per year ACES II Juniors & Seniors Advanced Academic Program Launching in Spring 2016 ~50 students per year
ACES I Curriculum • 14 total credits over the two years • Earn Honors College Citation in Cybersecurity
HACS208 Seminars • Honors seminars are limited to 20 seats • Sample Courses: • HACS208A: Accounting and Economic Aspects of Cybersecurity • HACS208C: Human Actors and Cyber Attacks • HACS208E: Reverse Engineering • HACS208F: A Global Perspective on Cybersecurity • HACS208P: Beyond Technology, the Policy Implications of Cyberspace • HACS208Z: Methods for Solving (and Not Solving) Puzzles
Program Activities • Extracurricular events focused around three areas: • EducationalEvents • Social Opportunities • Professional Development
ACES News • ACES year 3-4 approved as a minor • Northrop Grumman renews funding for ACES • LTS/NSA becomes a major partner of ACES • Additional support: • Parsons, MITRE, Leidos, and Secunetics • UMD wins 2015 Innovation & Economic Prosperity (IEP) University Awards by the Association of Public and Land-grant Universities (APLU)
Outline • Education • Outreach • ACES • Research • Deterrence: empirical studies
Deterrence and Cyberspace • Difficulty to identify the attacker • Difficulty to locate the attacker • Difficulty to prosecute in other countries No empirical study supporting that claim
Deterrence Aspects * * * WARNING * * * Unauthorized access to this computer is in violation of Md. Annotated Code, Criminal Law Article sections 8-606 and 7-302 and the Computer Fraud and Abuse Act, 18 U.S.C. sections 1030 et seq. … Warning Surveillance and monitoring tools Banner announcing Surveillance Surveillance
Cybercrime Framework SSH as point of entry Support different honeypot configurations (treatment) Support several experiments Large number of public IP addresses per experiment
Honeypot Lifecyle Honeypot recycled after 30 days Attacker brute-forces the honeypot After ~100+ login/password access is granted Attacker connects to honeypot and uses it Data collection
Surveillance • Experimental Setup • 300 public IP addresses • 4 different honeypot types • Metrics • Number of crimes • Temporal distribution of the crimes • Datasets • Network flow records to identify crimes • Keystrokes to identify malicious software installations
Observations • Results from April 2012 to October 2013 • 2,914 honeypots deployed • 611 crimes committed
Results • 64% of the honeypots with activity are used to build malicious attacks • Only 3% of the honeypots committed at least one crime
Deterrence Summary 3% of the honeypots Deterrence has no effect 64% of the honeypots • Reduces significantly the duration of the sessions Warning Surveillance • Impacts whether commands are typed in first session
More Information Michel Cukier Email: mcukier@umd.edu Phone: 301 314 2804 URL: http://terpconnect.umd.edu/~mcukier/ MC2 Education: http://www.cyber.umd.edu/education ACES: http://www.aces.umd.edu