SlideShare ist ein Scribd-Unternehmen logo
1 von 94
Cultural Markers in Attack
Attribution
Char Sample
44CON 2013

September 2013.

(c) Copyright 2013. All rights reserved.

1
Introduction
• Char Sample
– D. Sc. IA, Culture in CNA Behaviors
– CERT
– Defended April 18, 2013
– Acknowledgements
•
•
•
•
•
September 2013.

Dave Barnett
Maurice Smit
Dr. William Kight
Dr. Dana LaFon
Dr. Dominick Guess
(c) Copyright 2013. All rights reserved.

2
What Are We Really Trying to
Accomplish?
• Attribution … and other things.
– A way around the cat and mouse game of IP
address and anonymizers.
– Perhaps ways to cloak ourselves.
– Ways to discover new weaknesses or blind spots
in ourselves and our adversaries.

• A way to quantitatively prove the above!
• The real long-term goal.
September 2013.

(c) Copyright 2013. All rights reserved.

3
What Are We Looking For?

September 2013.

(c) Copyright 2013. All rights reserved.
The Reality Is…

S
5eptember 2013.

(c) Copyright 2013. All rights reserved.
The Research Goal

S
6eptember 2013.

(c) Copyright 2013. All rights reserved.
Applying New Methods to Old
Problems
• Can we use other
methods such as
thought processes to
source an attack?
• Is this a valid approach?

September 2013.

(c) Copyright 2013. All rights reserved.

7
A Different Thought
• What if attackers
unknowingly left clues
or behavior based
evidence?

September 2013.

(c) Copyright 2013. All rights reserved.

8
Why This Approach
• Haven’t we tried this before???
– No, we tried psychological profiling and that had
mixed results.
– Culture is a unique way to look at the problem.
• Cultural studies are not very old.
• Cultural studies in other disciplines have been very
successful.
• Cultural studies are easy for techies to understand.

September 2013.

(c) Copyright 2013. All rights reserved.

9
Refining the Thought
• What if the evidence was influenced by
culture?
• How does culture influence thought?
• How does a researcher prove all of this?

September 2013.

(c) Copyright 2013. All rights reserved.

10
Start with Thought
• Conscious thought 4060 bps.

September 2013.

• Unconscious thought
11, 200,000 bps.

(c) Copyright 2013. All rights reserved.

11
What About Culture?
• Hofstede, Hofstede & Minkov
– Definition of culture: “the collective mental
programming of the human mind which
distinguishes one group of people from another”.

September 2013.

(c) Copyright 2013. All rights reserved.

12
What About Culture?
• Dr. Dominick Guess
– Culture influences problem perception, strategy
development and the decision choices.

September 2013.

(c) Copyright 2013. All rights reserved.

13
How is Culture Learned?
• Family
• Small societal groups
• Education
– Cognition
– Technology usage

• Greater Society

September 2013.

(c) Copyright 2013. All rights reserved.

14
Learning Culture
• Bargh and Morsella (2008):
– “Cultural norms and values are readily absorbed
during the early phase of life; behaviors and
values of those closest to us are also absorbed”.
– “Culture appears to permeate both unconscious
thought and conscious thought”.

September 2013.

(c) Copyright 2013. All rights reserved.

15
Learning Culture
• Gifford (2005) - Past events help to form
future perceptions. (Bayesian belief process).
– A common example of Bayesian belief process

September 2013.

(c) Copyright 2013. All rights reserved.

16
Problem Statement
• The problem is the lack (or absence) of
quantitative literature that supports or refutes
the role of culture in CNAs.
• The research results must illustrate if a
relationship between culture and CNAs exists.
– The Internet unifies us, won’t there be one single
techie culture? Cultural convergence? (Clarke,
2004)
– Why study attacks by country?
September 2013.

(c) Copyright 2013. All rights reserved.

17
Purpose Statement
• Determine, through inference, if a
relationship exists between culture and
CNA behaviors.
– Use existing data for test and control groups.
– Data is also publicly available.
– Inference vs correlation or causation.

September 2013.

(c) Copyright 2013. All rights reserved.

18
Literature Review
• Baumeister & Masicampo, 2010; Evans, 2008
– The influencing role of culture in thought is pervasive.
– The influence of culture in cognition is inescapable
and habitual.

• Hofstede, Hofstede, & Minkov 2010; Minkov, 2013
– Unlearning habits or automatic thought processing is
more difficult than learning the behavior.
– Easier to learn and absorb cultural norms than to
unlearn them.

September 2013.

(c) Copyright 2013. All rights reserved.

19
The Role of Culture
• Buchtel & Norenzayan (2008)
– “The cultural differences are best
conceptualized as differences in habits of
thought, rather than differences in the actual
availability of information processing”.

September 2013.

(c) Copyright 2013. All rights reserved.

20
Literature Review Cultural
Dimensions
• Hofstede identified 4 cultural dimensions:
– Power distance (pdi)
– Individualism vs Collectivism (ivc)
– Masculine vs feminine (m/f)
– Uncertainty avoidance (uai)

• Others have added to the model
– Long Term Orientation( vs Short Term Orientation
(ltovsto) - Bond
– Indulgence vs restraint (ivr) - Minkov
September 2013.

(c) Copyright 2013. All rights reserved.

21
Cultural Dimensions & Attacks
• Power Distance (PDI) – (11-104)
– Egalitarian vs Bureaucratic - “Beg forgiveness” vs
ask permission”. Where does power originate?

September 2013.

(c) Copyright 2013. All rights reserved.

22
China
pdi 80
idv 20
m/f 66
ua 30
ltovssto 87
idr 24

September 2013.

(c) Copyright 2013. All rights reserved.

23
Cultural Dimensions & Attacks
• Individualism vs Collectivism (IVC) – (6-91)
– “I am in charge of my own destiny” vs “The needs
of the group must first be considered”.
– Education
• Individual: “How to learn”
• Collectivist: “How to do”

September 2013.

(c) Copyright 2013. All rights reserved.

24
Washington Post

September 2013.

(c) Copyright 2013. All rights reserved.

25
Profiles of Israel and US
• Israel
–
–
–
–
–
–

pdi: 13
idv: 54
m/f: 47
ua: 81
ltovssto: 36
ivr: n/a

September 2013.

• US:
–
–
–
–
–
–

pdi: 40
idv: 91
m/f: 62
ua: 46
ltovssto: 26
ivr: 68

(c) Copyright 2013. All rights reserved.

26
Cultural Dimensions & Attacks
• Masculine vs Feminine (M/F) – (5-110)
– Aggression vs consensus
“Give him an inch and he’ll take a mile” vs “Let’s
negotiate”.

September 2013.

(c) Copyright 2013. All rights reserved.

27
Fast Flux DNS
(Konte, Feamster & Jung, 2008)
Russia
pdi 93
idv 39
m/f 36
ua 95
ltovssto 81
idr 20

September 2013.

(c) Copyright 2013. All rights reserved.

28
Non-Confrontational Crimes

September 2013.

(c) Copyright 2013. All rights reserved.

29
Cultural Dimensions & Attacks
• Uncertainty Avoidance (UAI) – (8-112)
– How a society deals with the unknown.
Threatened & uncomfortable with ambiguous situations
vs curious about the unknown.

September 2013.

(c) Copyright 2013. All rights reserved.

30
September 2013.

(c) Copyright 2013. All rights reserved.

31
Comparison China vs US
(both low on UA)
• China
–
–
–
–
–
–

pdi 80
idv 20
m/f 66
ua 30
ltovssto 87
idr 24

September 2013.

• US
–
–
–
–
–
–

pdi 40
Idv 91
m/f 62
ua 46
ltovssto 26
idr 68

(c) Copyright 2013. All rights reserved.

32
September 2013.

(c) Copyright 2013. All rights reserved.

33
Comparison China vs US
(both low on UA)
• US
–
–
–
–
–
–

• Israel
pdi 40
idv 91
m/f 62
uai 46
ltovssto 26
ivr 68

September 2013.

–
–
–
–
–
–

pdi 13
idv 54
m/f 47
uai 81
ltovssto 38
ivr n/a

(c) Copyright 2013. All rights reserved.

34
Cultural Dimensions & Attacks
• LTO vs STO – (0-100)
– LTO: Fosters virtues aimed at future rewards
• Characterized by perseverance & hard work.
• Thrifty, but will invest.

– STO: Fosters virtues aimed at past and present
• Characterized by crediting luck.
• Will use “risky” behaviors.

September 2013.

(c) Copyright 2013. All rights reserved.

35
Cultural Dimensions & Attacks
• Indulgence vs Restraint (IVR) – (0-100)
– Free gratification vs restraint.
• Indulgent: enjoy life, have fun, appreciate compliments,
positive outlook.
• Restraint: moderation, “disinterested and pure”, few
desires, suspicious or embarrassed by compliments,
negative outlook.

September 2013.

(c) Copyright 2013. All rights reserved.

36
Indulgence vs Restraint
UK
pdi 35
idv 89
m/f 66
ua 35
ltovssto 51
ivr 69

September 2013.

US
pdi 40
idv 91
m/f 62
ua46
ltovssto 26
ivr 68

(c) Copyright 2013. All rights reserved.

37
Variables
• Independent variable
– Culture
– Six dimensions defined by Hofstede et al. (2010)
•
•
•
•
•
•

PDI (11-104)
IVC (6-91)
M/F (5-110)
UAI (8-112)
LTO (0-100)
IVR (0-100)

• Dependent variable: CNA behaviors
September 2013.

(c) Copyright 2013. All rights reserved.

38
Research Questions
• Research Questions:
– RQ1: Does a relationship exist between high
power distance index values or any other cultural
dimensional values and nationalistic, patriotic
themed website defacements?
•
•

September 2013.

Success relies on truth table results
The role of “or”

(c) Copyright 2013. All rights reserved.

39
Hypothesis
• Hypothesis
– A relationship exists between culture and CNA
behaviors.
•
•

H0 There is no relationship between culture and CNA
behaviors.
H1 A relationship exists between culture and CNA
behaviors.

– Hypothesis further decomposed into more
specific tests, same question posed for each
dimension.
September 2013.

(c) Copyright 2013. All rights reserved.

40
Research Plan (1)

• Quasi-experiment comparing a non-random sample
against the overall population.
– Research question 1: Extract countries of origin from
reports of nationalistic, patriotic themed website
defacements for comparison against Hofstede’s data on
countries.
• Compare scores to Hofstede’s operationalized data.
• Compare using measurements of central tendency.
• Hypothesis Tests:
– H10: There is no relationship between high PDI values or any other
dimensional values and nationalistic, patriotic themed website
defacements.
– H11-6: A relationship exists between dimensional value and nationalistic,
patriotic themed website defacements.

September 2013.

(c) Copyright 2013. All rights reserved.

41
Hypothesis Testing

September 2013.

(c) Copyright 2013. All rights reserved.

42
Issues, Concerns, Caveats
• Issues, concerns, caveats, etc.
– “The study of culture and decision making is a
relatively new and unexplored field (Guss, 2004).”
– Must guard against stereotypes.
– Hofstede’s work is not as precise as some would
like but it does offer quantifiable data that is
periodically updated.
– Even the obvious, must be supported by data.

September 2013.

(c) Copyright 2013. All rights reserved.

43
Data Collected: Dataset
• Searched on nationalistic, patriotic themed attacks.
– Verified results through peer reviewed academic studies.
– Nominal scoring:
• Studies were qualitative so an accurate count was not possible.
• Country is scored if verified evidence exists that shows that the
country participated in nationalistic, patriotic themed attacks.

– Collected data on the following countries:
• Bangladesh, China, India, Indonesia, Iran, Israel*, Malaysia, Pakistan,
Philippines, Portugal, Russia, Singapore, Taiwan, and Turkey.
(Columbia, Brazil, and Morocco were dropped due to lack of verifying
studies or reports in English.)
– The special case of Israel.
– The follow on search.

• Means tested the results.
September 2013.

(c) Copyright 2013. All rights reserved.

44
Rules for Success
• In order to reject the null hypothesis, a
resulting value for p* must be <= 0.05.
– This means that if a random sample were drawn,
the likelihood of getting these results would be
5%.
– The lower the value the more plausible the
alternative hypothesis.
– Put another way, results are in the tail of the
normal distribution curve.
September 2013.

(c) Copyright 2013. All rights reserved.

45
Hypothesis Testing

September 2013.

(c) Copyright 2013. All rights reserved.

46
RESEARCH QUESTION #1

September 2013.

(c) Copyright 2013. All rights reserved.

47
Results (1) – Peer Reviewed Data

Results of Research Question One Tests
_______________________________________________________________________
Hypothesis # Test
Tool
Z=
p-value Accept/Reject
_______________________________________________________________________
(PDI) H10, H11 μ <= 59 Mann-Whitney
1.91
0.0281 Reject
(IVC) H10, H12 μ >=45 Mann-Whitney
-2.17
0.015
Reject
(M/F) H10, H13 μ <= 50 Mann-Whitney
0.5753
0.4247 Accept
(UAI) H10, H14 μ <= 68 Mann-Whitney
-1.16
0.123
Accept
(LTO) H10, H15 μ <= 45 Mann-Whitney
1.15
0.1251 Accept
(IVR) H10,H16 μ >= 45 Mann-Whitney
-1.51
0.0655 Accept
_______________________________________________________________________

September 2013.

(c) Copyright 2013. All rights reserved.

48
Results (1) – All Data
Results of Research Question One Tests
_______________________________________________________________________
Hypothesis # Test
Tool
Z=
p-value Accept/Reject
_______________________________________________________________________
(PDI) H10, H11 μ <= 59 Mann-Whitney
2.08
0.0188 Reject
(IVC) H10, H12 μ >=45 Mann-Whitney
-2.3
0.0107 Reject
(M/F) H10, H13 μ <= 50 Mann-Whitney
0.16
0.4364 Accept
(UAI) H10, H14 μ <= 68 Mann-Whitney
0.9
0.1841 Accept
(LTO) H10, H15 μ <= 45 Mann-Whitney
-0.31
0.3783 Accept
(IVR) H10,H16 μ >= 45 Mann-Whitney
0.74
0.2297 Accept
_______________________________________________________________________

September 2013.

(c) Copyright 2013. All rights reserved.

49
Results (1) – Peer Reviewed Data
Results of Question One Test Without Israel
_______________________________________________________________________
Hypothesis # Test
Tool
Z=
p-value
Accept/Reject
_______________________________________________________________________
(PDI) H10, H11 μ <= 59 Mann-Whitney
2.42
0.0078 Reject
(IVC) H10, H12 μ >= 45 Mann-Whitney
-2.35
0.0094 Reject
(M/F) H10, H13 μ >= 50 Mann-Whitney
0.5714
0.4247 Accept
(UAI) H10, H14 μ <= 68 Mann-Whitney
-1.33
0.0918 Accept
(LTO) H10, H15 μ <= 45 Mann-Whitney
1.15
0.1251 Accept
(IVR) H10, H16 μ >= 45 Mann-Whitney
1.51
0.0655 Accept
_______________________________________________________________________

September 2013.

(c) Copyright 2013. All rights reserved.

50
Results (1) – All Data
Results of Research Question One Tests without Israel
_______________________________________________________________________
Hypothesis # Test
Tool
Z=
p-value Accept/Reject
_______________________________________________________________________
(PDI) H10, H11 μ <= 59 Mann-Whitney
2.54
0.0055 Reject
(IVC) H10, H12 μ >=45 Mann-Whitney
-2.45
0.0071 Reject
(M/F) H10, H13 μ <= 50 Mann-Whitney
- 0.19
0.4247 Accept
(UAI) H10, H14 μ <= 68 Mann-Whitney
1.04
0.1492 Accept
(LTO) H10, H15 μ <= 45 Mann-Whitney
-0.35
0.3632 Accept
(IVR) H10,H16 μ >= 45 Mann-Whitney
0.74
0.2297 Accept
_______________________________________________________________________

September 2013.

(c) Copyright 2013. All rights reserved.

51
Results (1)

Truth Table Results for Research Question One
PDI IVC M/F UAI LTOvSTO IVR
_________________________________________________________
1 1
0
0
0
0
_________________________________________________________
Note. 0 indicates the null hypothesis was accepted for the dimensional question and 1
indicates that the null hypothesis was rejected.

September 2013.

(c) Copyright 2013. All rights reserved.

52
Results – PDI (Useable Data)
Control Data

Sample Data

Population PDI Values
20
15
10
5
0

Actual PDI Results

September 2013.

(c) Copyright 2013. All rights reserved.

100-109

90-99

80-89

70-79

60-69

50-59

40-49

30-39

20-29

10-19

10-19
20 - 29
30 - 39
40 - 49
50-59
60-69
70-79
80-89
90-99
100-109

4
3
2
1
0

53
Results – PDI (Useable Data – IL)
Control Data

Sample Data

Actual PDI Results without
Israel

Population PDI Values
20
15
10
5
0

September 2013.

10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99
100-109

10-19
20 - 29
30 - 39
40 - 49
50-59
60-69
70-79
80-89
90-99
100-109

4
3
2
1
0

(c) Copyright 2013. All rights reserved.

54
Results – PDI All Data
Control Data

Sample Data

Population PDI Values
PDI All Data

10-19
20 - 29
30 - 39
40 - 49
50-59
60-69
70-79
80-89
90-99
100-109

20
15
10
5
0

September 2013.

4.5
4
3.5
3
2.5
2
1.5
1
0.5
0

(c) Copyright 2013. All rights reserved.

55
Results – PDI (All Data – Il)
Control Data

Sample Data

PDI All Data - Israel

Population PDI Values

10-19
20 - 29
30 - 39
40 - 49
50-59
60-69
70-79
80-89
90-99
100-109

20
15
10
5
0

September 2013.

4.5
4
3.5
3
2.5
2
1.5
1
0.5
0

(c) Copyright 2013. All rights reserved.

56
Results – PDI (Useable Data)
PDI With Israel

PDI Without Israel

10
8
6
4
2
0
low pdi neutral high pdi

10
9
8
7
6
5
4
3
2
1
0
low pdi

September 2013.

(c) Copyright 2013. All rights reserved.

neutral

high pdi
57
Results – All Data PDI
PDI With Israel

PDI Without Israel

10
9
8
7
6
5
4
3
2
1
0

10
8
6
4
2
0
low
low

September 2013.

neutral

neutral

high

high

(c) Copyright 2013. All rights reserved.

58
Results – IVC (Useable Data)
Control Data

Sample Data

Population IVC Values
14

Actual IVC Results
6

12

5

10

4

8

September 2013.

(c) Copyright 2013. All rights reserved.

90-99

80-89

70-79

0
60-69

0

50-59

1
40-49

2

20-29
30-39

2

10-19

4

0-9

3

0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99

6

59
Results – IVC (Useable Data)
Control Data

Sample Data
Actual IVC Results without
Israel

Population IVC Values
14

6

12

5

10

4

8

3

6

2

4

1

2

September 2013.

(c) Copyright 2013. All rights reserved.

90-99

80-89

70-79

60-69

50-59

40-49

30-39

20-29

10-19

0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99

0

0-9

0

60
Results - IVC (Useable Data)
IVC With Israel

IVC Without Israel

IVC Results
8
6
4
2
0

IVC Results without Israel
8
6
4
2
0

(c) Copyright 2013. All rights reserved.

61
Results IVC (All Data)
Control Group

Actual Results IVC All Data

Population IVC Values
IVC

14
6

12
10

5

8

4

6

3

4

2

2

1

0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99

0

September 2013.

0
10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99

(c) Copyright 2013. All rights reserved.

62
Results IVC (All Data - Il)
Control Group

Actual Results IVC All Data - Il
IVC - Israel

Population IVC Values
6

14
12

5

10
4

8
6

3

4

2

2

0
0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99

1

September 2013.

0
10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99

(c) Copyright 2013. All rights reserved.

63
Results - IVC (All Data)
IVC With Israel

IVC Without Israel

IVC Results
8
6
4
2
0

September 2013.

IVC Results without Israel
8
6
4
2
0

(c) Copyright 2013. All rights reserved.

64
Results – IVR (Useable Data)
Control Data

Sample Data

Population IVR Values
18
16
14
12
10
8
6
4
2
0

Actual IVR Results
6
5
4
3
2

September 2013.

(c) Copyright 2013. All rights reserved.

90-99

80-89

70-79

60-69

50-59

40-49

30-39

20-29

10-19

0
0-9

0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99
100-109

1

65
Results – IVR
(Useable Data)
• Data for this dimension
characteristics
•
•

Z Test Results z:
0.0307
Mann-Whitney
Results: 0.0655

Sample Data IVR Scores
8

7
6
5
4
3
2
1

0
Restrained
September 2013.

(c) Copyright 2013. All rights reserved.

Neutral

Indulgent
66
Results – UAI (Useable Data)
Control Data

Sample Data

Population UAI Scores
18
16
14
12
10
8
6
4
2
0

September 2013.

Actual UAI Scores
3.5
3
2.5
2
1.5
1
0.5
0

(c) Copyright 2013. All rights reserved.

67
Results – UAI (Useable Data)
Control Data

Sample Data

Population UAI Scores
4
3
3
2
2
1
1
0

0-9
10-19
20-29
30-39
40-49
50-59
60-69
70-79
80-89
90-99
100-109
110-119

18
16
14
12
10
8
6
4
2
0

Actual UAI Results Without
Israel

September 2013.

(c) Copyright 2013. All rights reserved.

68
Results - UAI All Data
Control Data

Actual Results All Data

Control Group UAI
UAI All Data

27.5
9

27

8
26.5

7
6

26

5
25.5

4
3

25

2
24.5

1
24

0
low uai

neutral

high uai

low uai

(c) Copyright 2013. All rights reserved.

neutral

high uai

69
RESEARCH QUESTION #2

70
Results (2)
Control Group (2012) Values
•
•
•
•
•
•
•
•
•
•
•

Africa East - 1 (77, 20, 46, 54, 9, 78)
Brazil – 1 (67, 38, 49, 76, 44, 59)
China – 3 (80, 20, 66, 30, 87, 24)
Germany – 1 (35, 67, 66, 30, 87, 24)
India – 2 (77, 48, 56, 40, 51, 26)
Iran – 1 (58, 41, 43, 59, 14, 40)
Japan – 1 (54, 46, 95, 92, 88, 42)
Mexico -1 (81, 30, 69, 82, 24, 97)
Russia – 1 (93, 39, 36, 95, 81, 20)
UK – 1 (35, 89, 66, 35, 51, 69)
US – 2 (40, 91, 62, 46, 26, 68)

Sample Group Values
•
•
•
•
•
•
•

Canada FR – 1 (54, 73, 45, 60, n, n)
Germany – 1 (35, 67, 66, 30, 87, 24)
Greece – 1 (60, 35, 57, 112, 45, 50)
Philippines – 1 (94, 32, 64,44, 27, 42)
Russia – 1 (93, 39, 36, 95, 81, 20)
UK – 4 (35, 89, 66, 35, 51, 69)
US – 6 (40, 91, 62, 46, 26, 68)

71
Results (2)
Results of Research Question Two Using 2012 Control Group
_____________________________________________________________________
Hypothesis # Test
Tool
U=
Z=
p-value Accept/Reject
_____________________________________________________________________
(PDI) H20, H21 μ >= 59 Mann-Whitney
162
-2.03
0.0212
Reject
(IVC) H20, H22 μ <= 45 Mann-Whitney
51
2.53
0.0057
Reject
(M/F) H20, H23 μ <= 50 Mann-Whitney
114
-0.04
0.484
Accept
(UAI) H20, H24 μ >= 68 Mann-Whitney
113
0
0.5
Accept
(STO)H20, H25 μ >= 45 Mann-Whitney
125
0.85
0.1977
Accept
(IVR) H20,H26 μ <= 45 Mann-Whitney
69
1.55
0.0606
Accept
_____________________________________________________________________

72
Results (2)
Control Group (2004) Values
•
•
•
•
•
•
•
•
•
•

Brazil – 1 (67, 38, 49, 76, 44, 59)
China – 3 (80, 20, 66, 30, 87, 24)
Germany – 1 (35, 67, 66, 30, 87, 24)
France – 1 ( 68, 71, 43, 86, 63, 48)
India – 1 (77, 48, 56, 40, 51, 26)
Iran – 1 (58, 41, 43, 59, 14, 40)
Japan – 2 (54, 46, 95, 92, 88, 42)
Mexico -1 (81, 30, 69, 82, 24, 97)
Russia – 1 (93, 39, 36, 95, 81, 20)
US – 2 (40, 91, 62, 46, 26, 68)

Sample Group Values
•
•
•
•
•
•

Canada FR – 1 (54, 73, 45, 60, n, n)
Germany – 1 (35, 67, 66, 30, 87, 24)
Greece – 1 (60, 35, 57, 112, 45, 50)
Philippines – 1 (94, 32, 64,44, 27, 42)
UK – 2 (35, 89, 66, 35, 51, 69)
US – 6 (40, 91, 62, 46, 26, 68)

73
Results (2)
Results of Research Question Two Control Group 2004 Data Smoothing
_______________________________________________________________________
Hypothesis # Test
Tool
U=
Z= p-value
Accept/Reject
_______________________________________________________________________
(PDI) H20, H21 μ >= 59 Mann-Whitney 109.5
-2.14
0.0162
Reject
(IVC) H20, H22 μ <= 45 Mann-Whitney
35.5
2.19
0.0143
Reject
(M/F) H20, H23 μ <= 50 Mann-Whitney
78
-0.32
0.3745
Accept
(UAI) H20, H24 μ >= 68 Mann-Whitney
80.5
-0.46
0.3228
Accept
(STO) H20,, H25 μ >= 45 Mann-Whitney
107.5
2.52
0.0059
Reject
(IVR) H20, H26 μ <= 45 Mann-Whitney
20.5
2.77
0.0028
Reject
_______________________________________________________________________

74
Results (2)
PDI IVC M/F UAI LTOvSTO IVR
_________________________________________________________
1 1 0
0
0 (1) 0 (1)
_________________________________________________________
Note. 0 indicates the null hypothesis was accepted for the dimensional question
and 1 indicates that the null hypothesis was rejected.

75
Results - PDI (2)
Control Data PDI - 2012

Sample Data PDI - 2012

9

12

8

10

7
6

8

5

6

4
3

4

2

2

1

0

0
low PDI

Neutral

high PDI

low PDI

Neutral

high PDI
76
Results – IVC (2)
Control Data IVC - 2012

Sample Data IVC -2012

8

14

7

12

6

10

5

8
6

4

4

3

2

2

0

1
0
Collectivist

Neutral

Individualist
77
Results – M/F (2)
Control Data M/F - 2012

Sample Data M/F - 2012

10
9
8
7
6
5
4
3
2
1
0

14
12
10
8
6
4
2

0
Feminine

Neutral

Masculine

Feminine

Neutral

Masculine
78
Results – UAI (2)
Control Data UAI - 2012

Sample Data UAI - 2012

10
9
8
7
6
5
4
3
2
1
0

12
10
8
6
4

2
0
low UAI

Neutral

high UAI

low UAI

Neutral

high UAI
79
Results – IVR (2)
Control Data IVR - 2012

Sample Data IVR - 2012

7

12

6

10

5

8

4

6

3

4

2
1

2

0

0
Restrained

Neutral

Indulgent

Restrained

Neutral

Indulgent
80
Conclusions
• Results
– Statistically significant relationship between high PDI and low IVC
dimensions and nationalistic, patriotic themed website attacks.
– Statistically significant relationship between low PDI and high IVC
dimensions and “lone wolf” attacking behaviors.
– Notable observations in IVR and UAI.

• Next Steps
– Expand using larger datasets.
• Correlational studies pdi data from zone-h.org

– Focus questions for other dimensions examining for cultural traces
in other activities such as software coding, malware
behaviors, attack strategies or TTPs…
• UAI malware
• UAI coding errors

September 2013.

(c) Copyright 2013. All rights reserved.

81
Conclusion
• There appears to be relationship between culture and certain
CNA behaviors.

•
•

Means testing using Mann-Whitney verified 2 of 6 dimensions.
An even more interesting finding was the lack of activity in certain
ends of specific dimensions.
•
•
•
•
•

September 2013.

Low power distance
Individualism
High uncertainty avoidance
Short term orientation
Indulgence

(c) Copyright 2013. All rights reserved.

82
Thank you!

Dr. Char Sample
csample@cert.org or charsample50@gmail.com
CERT/NetSA 2013

September 2013.

(c) Copyright 2013. All rights reserved.

83
Cultural Research
• Dr. Dominck Guss (Guess, 2004)
– Funded in part by NSF to examine cognitive
processing.
– Discussed basic assumptions then asked (2011)
• “Does culture influence how students learn”?
• If so “does this leave traces”?

– Pointed to Dr. Hofstede’s work and sent some papers
my way.
• Dr. Dominik Guss & Dietrich Dorner (2010) observed that
culture influences problem perception, strategy
development and the decision choices.
• This mental software is subconsciously used during problem
solving situations (Hofstede 2001, Guss, & Dorner 2010).
September 2013.

(c) Copyright 2013. All rights reserved.

84
Cultural Research
• Guss’s (continued):
– Findings (continued)
• Guss and Wiley (2007) noticed that novel problems resulted in the
problem solvers relying on culturally developed and learned
strategies to solve the problem.
• “Strategies were even stronger predictors of performance than the
control variables computer experience and intelligence” (2011).
• Culture influences: perception, categorization, and reasoning (2011).

• Other’s
– Berry (2004) and Strohschneider (2001) also observed that
development of problem solving strategies vary by culture.
– Bornstein, Kugler, & Ziegelmeyer (2003) observed cultural
differences with decision making in game playing experiments.

September 2013.

(c) Copyright 2013. All rights reserved.

85
Parameters of Culture
• Parameters
– Does not reflect differences between individuals.
– Statements about cultures are general and
relative.
– The appeal of culture lies in the fact that the
people’s thought processes subconsciously
reflect their cultural background.
• While not great for individual hacker attribution it has
cyberwar implications: defensive and offensive.
• Markers, if they exist, should reveal themselves, even
with re-used attacks.

September 2013.

(c) Copyright 2013. All rights reserved.

86
Research Plan(2)
• Why inferential quasi-experiment vs
correlation or causal research plans.
– The type of data available largely determines the
method.
• Unable to meet academic criteria for data with any
accuracy.

– Choosing quantitative research limited options.
• Quantitative chosen controversy that it can generate
was chosen due in part to the nature of this study.

September 2013.

(c) Copyright 2013. All rights reserved.

87
Conclusion
• This approach relies on unconscious thought patterns of
attackers that have been institutionalized through
national education systems.

•

This researcher hopes to provide evidence that culture does play a
role in CNA choices and behaviors.

•

The literature reviewed supports the hypothesis, data is currently
being collected.
• There is much more work to be done, if this hypothesis proves
correct.
• The current study, while promising is limited in scope, more
information is needed on each dimension and associating attacks
within each dimension.

September 2013.

(c) Copyright 2013. All rights reserved.

88
In Other Words
• System 360

September 2013.

• Google

(c) Copyright 2013. All rights reserved.

89
Results - PDI (2)
Control Data PDI - 2004

Sample Data PDI - 2004

6

10
9
8
7
6
5
4
3
2
1
0

5
4
3
2

1
0
low PDI

Neutral

high PDI

low PDI

Neutral

high PDI
90
Results – IVC (2)
Control Data IVC - 2004

Sample Data IVC -2004

6

12
10

5

8
4

6

3

4

2

2
0

1
0
Collectivist

Neutral

Individualist
91
Results – M/F (2)
Control Data M/F - 2004

Sample Data M/F - 2004

9

12

8

10

7
6

8

5

6

4
3

4

2

2

1

0

0
Feminine

Neutral

Masculine

Feminine

Neutral

Masculine
92
Results – UAI (2)
Control Data UAI - 2004

Sample Data UAI - 2004

7

10
9
8
7
6
5
4
3
2
1
0

6
5
4
3
2
1

0
low UAI

Neutral

high UAI

low UAI

Neutral

high UAI
93
Results – IVR (2)
Control Data IVR - 2004

Sample Data IVR - 2004

6

9

8

5

7

4

6
5

3

4

2

3
2

1

1

0

0
Restrained

Neutral

Indulgent

Restrained

Neutral

Indulgent
94

Weitere ähnliche Inhalte

Ähnlich wie 44CON 2013 - Culture & CNA Behaviors - Char Sample

When will there be a digital revolution in the humanities?
When will there be a digital revolution in the humanities?When will there be a digital revolution in the humanities?
When will there be a digital revolution in the humanities?Martin Wynne
 
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Gayle Simon
 
Reflections on Positionality
Reflections on PositionalityReflections on Positionality
Reflections on PositionalityINSITUM
 
Overview of Citizen Science - Zurich November 2015
Overview of Citizen Science - Zurich November 2015Overview of Citizen Science - Zurich November 2015
Overview of Citizen Science - Zurich November 2015Muki Haklay
 
Equality and access
Equality and accessEquality and access
Equality and accessJo Moriarty
 
Matt maycock slow research 17th feb 2014
Matt maycock   slow research 17th feb 2014Matt maycock   slow research 17th feb 2014
Matt maycock slow research 17th feb 2014Matthew Maycock
 
citizen science repot.pdf
citizen science repot.pdfcitizen science repot.pdf
citizen science repot.pdfNioBelano2
 
Haw GIScience lost its interdisciplinary mojo?
Haw GIScience lost its interdisciplinary mojo?Haw GIScience lost its interdisciplinary mojo?
Haw GIScience lost its interdisciplinary mojo?Muki Haklay
 
Cultureandsociety 141111175142-conversion-gate01
Cultureandsociety 141111175142-conversion-gate01Cultureandsociety 141111175142-conversion-gate01
Cultureandsociety 141111175142-conversion-gate01Cleophas Rwemera
 
Colin Poulton: Political economy: the policy process
Colin Poulton: Political economy: the policy processColin Poulton: Political economy: the policy process
Colin Poulton: Political economy: the policy processfutureagricultures
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
National Science Day-2014 by Santosh Takale
National Science Day-2014 by Santosh TakaleNational Science Day-2014 by Santosh Takale
National Science Day-2014 by Santosh TakaleSantosh Takale
 
Why, and Why Now?
Why, and Why Now?Why, and Why Now?
Why, and Why Now?Ray Poynter
 
The ECSA Characteristics of Citizen Science
The ECSA Characteristics of Citizen ScienceThe ECSA Characteristics of Citizen Science
The ECSA Characteristics of Citizen ScienceMargaret Gold
 

Ähnlich wie 44CON 2013 - Culture & CNA Behaviors - Char Sample (20)

When will there be a digital revolution in the humanities?
When will there be a digital revolution in the humanities?When will there be a digital revolution in the humanities?
When will there be a digital revolution in the humanities?
 
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
 
Reflections on Positionality
Reflections on PositionalityReflections on Positionality
Reflections on Positionality
 
Overview of Citizen Science - Zurich November 2015
Overview of Citizen Science - Zurich November 2015Overview of Citizen Science - Zurich November 2015
Overview of Citizen Science - Zurich November 2015
 
Equality and access
Equality and accessEquality and access
Equality and access
 
Matt maycock slow research 17th feb 2014
Matt maycock   slow research 17th feb 2014Matt maycock   slow research 17th feb 2014
Matt maycock slow research 17th feb 2014
 
Sociology Applied to Transportation Planning
Sociology Applied to Transportation PlanningSociology Applied to Transportation Planning
Sociology Applied to Transportation Planning
 
citizen science repot.pdf
citizen science repot.pdfcitizen science repot.pdf
citizen science repot.pdf
 
Haw GIScience lost its interdisciplinary mojo?
Haw GIScience lost its interdisciplinary mojo?Haw GIScience lost its interdisciplinary mojo?
Haw GIScience lost its interdisciplinary mojo?
 
Cultureandsociety 141111175142-conversion-gate01
Cultureandsociety 141111175142-conversion-gate01Cultureandsociety 141111175142-conversion-gate01
Cultureandsociety 141111175142-conversion-gate01
 
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul PrinslooLASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
 
Sahela presentation 5 july2013 final
Sahela presentation 5 july2013 finalSahela presentation 5 july2013 final
Sahela presentation 5 july2013 final
 
320f13 week1
320f13 week1320f13 week1
320f13 week1
 
Colin Poulton: Political economy: the policy process
Colin Poulton: Political economy: the policy processColin Poulton: Political economy: the policy process
Colin Poulton: Political economy: the policy process
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
Science & Technology Communication
Science & Technology CommunicationScience & Technology Communication
Science & Technology Communication
 
co:op-READ-Convention Marburg - Milena Dobreva
co:op-READ-Convention Marburg - Milena Dobrevaco:op-READ-Convention Marburg - Milena Dobreva
co:op-READ-Convention Marburg - Milena Dobreva
 
National Science Day-2014 by Santosh Takale
National Science Day-2014 by Santosh TakaleNational Science Day-2014 by Santosh Takale
National Science Day-2014 by Santosh Takale
 
Why, and Why Now?
Why, and Why Now?Why, and Why Now?
Why, and Why Now?
 
The ECSA Characteristics of Citizen Science
The ECSA Characteristics of Citizen ScienceThe ECSA Characteristics of Citizen Science
The ECSA Characteristics of Citizen Science
 

Mehr von 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 

Mehr von 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 

Kürzlich hochgeladen

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 

Kürzlich hochgeladen (20)

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 

44CON 2013 - Culture & CNA Behaviors - Char Sample

  • 1. Cultural Markers in Attack Attribution Char Sample 44CON 2013 September 2013. (c) Copyright 2013. All rights reserved. 1
  • 2. Introduction • Char Sample – D. Sc. IA, Culture in CNA Behaviors – CERT – Defended April 18, 2013 – Acknowledgements • • • • • September 2013. Dave Barnett Maurice Smit Dr. William Kight Dr. Dana LaFon Dr. Dominick Guess (c) Copyright 2013. All rights reserved. 2
  • 3. What Are We Really Trying to Accomplish? • Attribution … and other things. – A way around the cat and mouse game of IP address and anonymizers. – Perhaps ways to cloak ourselves. – Ways to discover new weaknesses or blind spots in ourselves and our adversaries. • A way to quantitatively prove the above! • The real long-term goal. September 2013. (c) Copyright 2013. All rights reserved. 3
  • 4. What Are We Looking For? September 2013. (c) Copyright 2013. All rights reserved.
  • 5. The Reality Is… S 5eptember 2013. (c) Copyright 2013. All rights reserved.
  • 6. The Research Goal S 6eptember 2013. (c) Copyright 2013. All rights reserved.
  • 7. Applying New Methods to Old Problems • Can we use other methods such as thought processes to source an attack? • Is this a valid approach? September 2013. (c) Copyright 2013. All rights reserved. 7
  • 8. A Different Thought • What if attackers unknowingly left clues or behavior based evidence? September 2013. (c) Copyright 2013. All rights reserved. 8
  • 9. Why This Approach • Haven’t we tried this before??? – No, we tried psychological profiling and that had mixed results. – Culture is a unique way to look at the problem. • Cultural studies are not very old. • Cultural studies in other disciplines have been very successful. • Cultural studies are easy for techies to understand. September 2013. (c) Copyright 2013. All rights reserved. 9
  • 10. Refining the Thought • What if the evidence was influenced by culture? • How does culture influence thought? • How does a researcher prove all of this? September 2013. (c) Copyright 2013. All rights reserved. 10
  • 11. Start with Thought • Conscious thought 4060 bps. September 2013. • Unconscious thought 11, 200,000 bps. (c) Copyright 2013. All rights reserved. 11
  • 12. What About Culture? • Hofstede, Hofstede & Minkov – Definition of culture: “the collective mental programming of the human mind which distinguishes one group of people from another”. September 2013. (c) Copyright 2013. All rights reserved. 12
  • 13. What About Culture? • Dr. Dominick Guess – Culture influences problem perception, strategy development and the decision choices. September 2013. (c) Copyright 2013. All rights reserved. 13
  • 14. How is Culture Learned? • Family • Small societal groups • Education – Cognition – Technology usage • Greater Society September 2013. (c) Copyright 2013. All rights reserved. 14
  • 15. Learning Culture • Bargh and Morsella (2008): – “Cultural norms and values are readily absorbed during the early phase of life; behaviors and values of those closest to us are also absorbed”. – “Culture appears to permeate both unconscious thought and conscious thought”. September 2013. (c) Copyright 2013. All rights reserved. 15
  • 16. Learning Culture • Gifford (2005) - Past events help to form future perceptions. (Bayesian belief process). – A common example of Bayesian belief process September 2013. (c) Copyright 2013. All rights reserved. 16
  • 17. Problem Statement • The problem is the lack (or absence) of quantitative literature that supports or refutes the role of culture in CNAs. • The research results must illustrate if a relationship between culture and CNAs exists. – The Internet unifies us, won’t there be one single techie culture? Cultural convergence? (Clarke, 2004) – Why study attacks by country? September 2013. (c) Copyright 2013. All rights reserved. 17
  • 18. Purpose Statement • Determine, through inference, if a relationship exists between culture and CNA behaviors. – Use existing data for test and control groups. – Data is also publicly available. – Inference vs correlation or causation. September 2013. (c) Copyright 2013. All rights reserved. 18
  • 19. Literature Review • Baumeister & Masicampo, 2010; Evans, 2008 – The influencing role of culture in thought is pervasive. – The influence of culture in cognition is inescapable and habitual. • Hofstede, Hofstede, & Minkov 2010; Minkov, 2013 – Unlearning habits or automatic thought processing is more difficult than learning the behavior. – Easier to learn and absorb cultural norms than to unlearn them. September 2013. (c) Copyright 2013. All rights reserved. 19
  • 20. The Role of Culture • Buchtel & Norenzayan (2008) – “The cultural differences are best conceptualized as differences in habits of thought, rather than differences in the actual availability of information processing”. September 2013. (c) Copyright 2013. All rights reserved. 20
  • 21. Literature Review Cultural Dimensions • Hofstede identified 4 cultural dimensions: – Power distance (pdi) – Individualism vs Collectivism (ivc) – Masculine vs feminine (m/f) – Uncertainty avoidance (uai) • Others have added to the model – Long Term Orientation( vs Short Term Orientation (ltovsto) - Bond – Indulgence vs restraint (ivr) - Minkov September 2013. (c) Copyright 2013. All rights reserved. 21
  • 22. Cultural Dimensions & Attacks • Power Distance (PDI) – (11-104) – Egalitarian vs Bureaucratic - “Beg forgiveness” vs ask permission”. Where does power originate? September 2013. (c) Copyright 2013. All rights reserved. 22
  • 23. China pdi 80 idv 20 m/f 66 ua 30 ltovssto 87 idr 24 September 2013. (c) Copyright 2013. All rights reserved. 23
  • 24. Cultural Dimensions & Attacks • Individualism vs Collectivism (IVC) – (6-91) – “I am in charge of my own destiny” vs “The needs of the group must first be considered”. – Education • Individual: “How to learn” • Collectivist: “How to do” September 2013. (c) Copyright 2013. All rights reserved. 24
  • 25. Washington Post September 2013. (c) Copyright 2013. All rights reserved. 25
  • 26. Profiles of Israel and US • Israel – – – – – – pdi: 13 idv: 54 m/f: 47 ua: 81 ltovssto: 36 ivr: n/a September 2013. • US: – – – – – – pdi: 40 idv: 91 m/f: 62 ua: 46 ltovssto: 26 ivr: 68 (c) Copyright 2013. All rights reserved. 26
  • 27. Cultural Dimensions & Attacks • Masculine vs Feminine (M/F) – (5-110) – Aggression vs consensus “Give him an inch and he’ll take a mile” vs “Let’s negotiate”. September 2013. (c) Copyright 2013. All rights reserved. 27
  • 28. Fast Flux DNS (Konte, Feamster & Jung, 2008) Russia pdi 93 idv 39 m/f 36 ua 95 ltovssto 81 idr 20 September 2013. (c) Copyright 2013. All rights reserved. 28
  • 29. Non-Confrontational Crimes September 2013. (c) Copyright 2013. All rights reserved. 29
  • 30. Cultural Dimensions & Attacks • Uncertainty Avoidance (UAI) – (8-112) – How a society deals with the unknown. Threatened & uncomfortable with ambiguous situations vs curious about the unknown. September 2013. (c) Copyright 2013. All rights reserved. 30
  • 31. September 2013. (c) Copyright 2013. All rights reserved. 31
  • 32. Comparison China vs US (both low on UA) • China – – – – – – pdi 80 idv 20 m/f 66 ua 30 ltovssto 87 idr 24 September 2013. • US – – – – – – pdi 40 Idv 91 m/f 62 ua 46 ltovssto 26 idr 68 (c) Copyright 2013. All rights reserved. 32
  • 33. September 2013. (c) Copyright 2013. All rights reserved. 33
  • 34. Comparison China vs US (both low on UA) • US – – – – – – • Israel pdi 40 idv 91 m/f 62 uai 46 ltovssto 26 ivr 68 September 2013. – – – – – – pdi 13 idv 54 m/f 47 uai 81 ltovssto 38 ivr n/a (c) Copyright 2013. All rights reserved. 34
  • 35. Cultural Dimensions & Attacks • LTO vs STO – (0-100) – LTO: Fosters virtues aimed at future rewards • Characterized by perseverance & hard work. • Thrifty, but will invest. – STO: Fosters virtues aimed at past and present • Characterized by crediting luck. • Will use “risky” behaviors. September 2013. (c) Copyright 2013. All rights reserved. 35
  • 36. Cultural Dimensions & Attacks • Indulgence vs Restraint (IVR) – (0-100) – Free gratification vs restraint. • Indulgent: enjoy life, have fun, appreciate compliments, positive outlook. • Restraint: moderation, “disinterested and pure”, few desires, suspicious or embarrassed by compliments, negative outlook. September 2013. (c) Copyright 2013. All rights reserved. 36
  • 37. Indulgence vs Restraint UK pdi 35 idv 89 m/f 66 ua 35 ltovssto 51 ivr 69 September 2013. US pdi 40 idv 91 m/f 62 ua46 ltovssto 26 ivr 68 (c) Copyright 2013. All rights reserved. 37
  • 38. Variables • Independent variable – Culture – Six dimensions defined by Hofstede et al. (2010) • • • • • • PDI (11-104) IVC (6-91) M/F (5-110) UAI (8-112) LTO (0-100) IVR (0-100) • Dependent variable: CNA behaviors September 2013. (c) Copyright 2013. All rights reserved. 38
  • 39. Research Questions • Research Questions: – RQ1: Does a relationship exist between high power distance index values or any other cultural dimensional values and nationalistic, patriotic themed website defacements? • • September 2013. Success relies on truth table results The role of “or” (c) Copyright 2013. All rights reserved. 39
  • 40. Hypothesis • Hypothesis – A relationship exists between culture and CNA behaviors. • • H0 There is no relationship between culture and CNA behaviors. H1 A relationship exists between culture and CNA behaviors. – Hypothesis further decomposed into more specific tests, same question posed for each dimension. September 2013. (c) Copyright 2013. All rights reserved. 40
  • 41. Research Plan (1) • Quasi-experiment comparing a non-random sample against the overall population. – Research question 1: Extract countries of origin from reports of nationalistic, patriotic themed website defacements for comparison against Hofstede’s data on countries. • Compare scores to Hofstede’s operationalized data. • Compare using measurements of central tendency. • Hypothesis Tests: – H10: There is no relationship between high PDI values or any other dimensional values and nationalistic, patriotic themed website defacements. – H11-6: A relationship exists between dimensional value and nationalistic, patriotic themed website defacements. September 2013. (c) Copyright 2013. All rights reserved. 41
  • 42. Hypothesis Testing September 2013. (c) Copyright 2013. All rights reserved. 42
  • 43. Issues, Concerns, Caveats • Issues, concerns, caveats, etc. – “The study of culture and decision making is a relatively new and unexplored field (Guss, 2004).” – Must guard against stereotypes. – Hofstede’s work is not as precise as some would like but it does offer quantifiable data that is periodically updated. – Even the obvious, must be supported by data. September 2013. (c) Copyright 2013. All rights reserved. 43
  • 44. Data Collected: Dataset • Searched on nationalistic, patriotic themed attacks. – Verified results through peer reviewed academic studies. – Nominal scoring: • Studies were qualitative so an accurate count was not possible. • Country is scored if verified evidence exists that shows that the country participated in nationalistic, patriotic themed attacks. – Collected data on the following countries: • Bangladesh, China, India, Indonesia, Iran, Israel*, Malaysia, Pakistan, Philippines, Portugal, Russia, Singapore, Taiwan, and Turkey. (Columbia, Brazil, and Morocco were dropped due to lack of verifying studies or reports in English.) – The special case of Israel. – The follow on search. • Means tested the results. September 2013. (c) Copyright 2013. All rights reserved. 44
  • 45. Rules for Success • In order to reject the null hypothesis, a resulting value for p* must be <= 0.05. – This means that if a random sample were drawn, the likelihood of getting these results would be 5%. – The lower the value the more plausible the alternative hypothesis. – Put another way, results are in the tail of the normal distribution curve. September 2013. (c) Copyright 2013. All rights reserved. 45
  • 46. Hypothesis Testing September 2013. (c) Copyright 2013. All rights reserved. 46
  • 47. RESEARCH QUESTION #1 September 2013. (c) Copyright 2013. All rights reserved. 47
  • 48. Results (1) – Peer Reviewed Data Results of Research Question One Tests _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 1.91 0.0281 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.17 0.015 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney 0.5753 0.4247 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney -1.16 0.123 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney 1.15 0.1251 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney -1.51 0.0655 Accept _______________________________________________________________________ September 2013. (c) Copyright 2013. All rights reserved. 48
  • 49. Results (1) – All Data Results of Research Question One Tests _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.08 0.0188 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.3 0.0107 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney 0.16 0.4364 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney 0.9 0.1841 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney -0.31 0.3783 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney 0.74 0.2297 Accept _______________________________________________________________________ September 2013. (c) Copyright 2013. All rights reserved. 49
  • 50. Results (1) – Peer Reviewed Data Results of Question One Test Without Israel _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.42 0.0078 Reject (IVC) H10, H12 μ >= 45 Mann-Whitney -2.35 0.0094 Reject (M/F) H10, H13 μ >= 50 Mann-Whitney 0.5714 0.4247 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney -1.33 0.0918 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney 1.15 0.1251 Accept (IVR) H10, H16 μ >= 45 Mann-Whitney 1.51 0.0655 Accept _______________________________________________________________________ September 2013. (c) Copyright 2013. All rights reserved. 50
  • 51. Results (1) – All Data Results of Research Question One Tests without Israel _______________________________________________________________________ Hypothesis # Test Tool Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H10, H11 μ <= 59 Mann-Whitney 2.54 0.0055 Reject (IVC) H10, H12 μ >=45 Mann-Whitney -2.45 0.0071 Reject (M/F) H10, H13 μ <= 50 Mann-Whitney - 0.19 0.4247 Accept (UAI) H10, H14 μ <= 68 Mann-Whitney 1.04 0.1492 Accept (LTO) H10, H15 μ <= 45 Mann-Whitney -0.35 0.3632 Accept (IVR) H10,H16 μ >= 45 Mann-Whitney 0.74 0.2297 Accept _______________________________________________________________________ September 2013. (c) Copyright 2013. All rights reserved. 51
  • 52. Results (1) Truth Table Results for Research Question One PDI IVC M/F UAI LTOvSTO IVR _________________________________________________________ 1 1 0 0 0 0 _________________________________________________________ Note. 0 indicates the null hypothesis was accepted for the dimensional question and 1 indicates that the null hypothesis was rejected. September 2013. (c) Copyright 2013. All rights reserved. 52
  • 53. Results – PDI (Useable Data) Control Data Sample Data Population PDI Values 20 15 10 5 0 Actual PDI Results September 2013. (c) Copyright 2013. All rights reserved. 100-109 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 10-19 20 - 29 30 - 39 40 - 49 50-59 60-69 70-79 80-89 90-99 100-109 4 3 2 1 0 53
  • 54. Results – PDI (Useable Data – IL) Control Data Sample Data Actual PDI Results without Israel Population PDI Values 20 15 10 5 0 September 2013. 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 10-19 20 - 29 30 - 39 40 - 49 50-59 60-69 70-79 80-89 90-99 100-109 4 3 2 1 0 (c) Copyright 2013. All rights reserved. 54
  • 55. Results – PDI All Data Control Data Sample Data Population PDI Values PDI All Data 10-19 20 - 29 30 - 39 40 - 49 50-59 60-69 70-79 80-89 90-99 100-109 20 15 10 5 0 September 2013. 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 (c) Copyright 2013. All rights reserved. 55
  • 56. Results – PDI (All Data – Il) Control Data Sample Data PDI All Data - Israel Population PDI Values 10-19 20 - 29 30 - 39 40 - 49 50-59 60-69 70-79 80-89 90-99 100-109 20 15 10 5 0 September 2013. 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 (c) Copyright 2013. All rights reserved. 56
  • 57. Results – PDI (Useable Data) PDI With Israel PDI Without Israel 10 8 6 4 2 0 low pdi neutral high pdi 10 9 8 7 6 5 4 3 2 1 0 low pdi September 2013. (c) Copyright 2013. All rights reserved. neutral high pdi 57
  • 58. Results – All Data PDI PDI With Israel PDI Without Israel 10 9 8 7 6 5 4 3 2 1 0 10 8 6 4 2 0 low low September 2013. neutral neutral high high (c) Copyright 2013. All rights reserved. 58
  • 59. Results – IVC (Useable Data) Control Data Sample Data Population IVC Values 14 Actual IVC Results 6 12 5 10 4 8 September 2013. (c) Copyright 2013. All rights reserved. 90-99 80-89 70-79 0 60-69 0 50-59 1 40-49 2 20-29 30-39 2 10-19 4 0-9 3 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 6 59
  • 60. Results – IVC (Useable Data) Control Data Sample Data Actual IVC Results without Israel Population IVC Values 14 6 12 5 10 4 8 3 6 2 4 1 2 September 2013. (c) Copyright 2013. All rights reserved. 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 0 0-9 0 60
  • 61. Results - IVC (Useable Data) IVC With Israel IVC Without Israel IVC Results 8 6 4 2 0 IVC Results without Israel 8 6 4 2 0 (c) Copyright 2013. All rights reserved. 61
  • 62. Results IVC (All Data) Control Group Actual Results IVC All Data Population IVC Values IVC 14 6 12 10 5 8 4 6 3 4 2 2 1 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 0 September 2013. 0 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 (c) Copyright 2013. All rights reserved. 62
  • 63. Results IVC (All Data - Il) Control Group Actual Results IVC All Data - Il IVC - Israel Population IVC Values 6 14 12 5 10 4 8 6 3 4 2 2 0 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 1 September 2013. 0 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 (c) Copyright 2013. All rights reserved. 63
  • 64. Results - IVC (All Data) IVC With Israel IVC Without Israel IVC Results 8 6 4 2 0 September 2013. IVC Results without Israel 8 6 4 2 0 (c) Copyright 2013. All rights reserved. 64
  • 65. Results – IVR (Useable Data) Control Data Sample Data Population IVR Values 18 16 14 12 10 8 6 4 2 0 Actual IVR Results 6 5 4 3 2 September 2013. (c) Copyright 2013. All rights reserved. 90-99 80-89 70-79 60-69 50-59 40-49 30-39 20-29 10-19 0 0-9 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 1 65
  • 66. Results – IVR (Useable Data) • Data for this dimension characteristics • • Z Test Results z: 0.0307 Mann-Whitney Results: 0.0655 Sample Data IVR Scores 8 7 6 5 4 3 2 1 0 Restrained September 2013. (c) Copyright 2013. All rights reserved. Neutral Indulgent 66
  • 67. Results – UAI (Useable Data) Control Data Sample Data Population UAI Scores 18 16 14 12 10 8 6 4 2 0 September 2013. Actual UAI Scores 3.5 3 2.5 2 1.5 1 0.5 0 (c) Copyright 2013. All rights reserved. 67
  • 68. Results – UAI (Useable Data) Control Data Sample Data Population UAI Scores 4 3 3 2 2 1 1 0 0-9 10-19 20-29 30-39 40-49 50-59 60-69 70-79 80-89 90-99 100-109 110-119 18 16 14 12 10 8 6 4 2 0 Actual UAI Results Without Israel September 2013. (c) Copyright 2013. All rights reserved. 68
  • 69. Results - UAI All Data Control Data Actual Results All Data Control Group UAI UAI All Data 27.5 9 27 8 26.5 7 6 26 5 25.5 4 3 25 2 24.5 1 24 0 low uai neutral high uai low uai (c) Copyright 2013. All rights reserved. neutral high uai 69
  • 71. Results (2) Control Group (2012) Values • • • • • • • • • • • Africa East - 1 (77, 20, 46, 54, 9, 78) Brazil – 1 (67, 38, 49, 76, 44, 59) China – 3 (80, 20, 66, 30, 87, 24) Germany – 1 (35, 67, 66, 30, 87, 24) India – 2 (77, 48, 56, 40, 51, 26) Iran – 1 (58, 41, 43, 59, 14, 40) Japan – 1 (54, 46, 95, 92, 88, 42) Mexico -1 (81, 30, 69, 82, 24, 97) Russia – 1 (93, 39, 36, 95, 81, 20) UK – 1 (35, 89, 66, 35, 51, 69) US – 2 (40, 91, 62, 46, 26, 68) Sample Group Values • • • • • • • Canada FR – 1 (54, 73, 45, 60, n, n) Germany – 1 (35, 67, 66, 30, 87, 24) Greece – 1 (60, 35, 57, 112, 45, 50) Philippines – 1 (94, 32, 64,44, 27, 42) Russia – 1 (93, 39, 36, 95, 81, 20) UK – 4 (35, 89, 66, 35, 51, 69) US – 6 (40, 91, 62, 46, 26, 68) 71
  • 72. Results (2) Results of Research Question Two Using 2012 Control Group _____________________________________________________________________ Hypothesis # Test Tool U= Z= p-value Accept/Reject _____________________________________________________________________ (PDI) H20, H21 μ >= 59 Mann-Whitney 162 -2.03 0.0212 Reject (IVC) H20, H22 μ <= 45 Mann-Whitney 51 2.53 0.0057 Reject (M/F) H20, H23 μ <= 50 Mann-Whitney 114 -0.04 0.484 Accept (UAI) H20, H24 μ >= 68 Mann-Whitney 113 0 0.5 Accept (STO)H20, H25 μ >= 45 Mann-Whitney 125 0.85 0.1977 Accept (IVR) H20,H26 μ <= 45 Mann-Whitney 69 1.55 0.0606 Accept _____________________________________________________________________ 72
  • 73. Results (2) Control Group (2004) Values • • • • • • • • • • Brazil – 1 (67, 38, 49, 76, 44, 59) China – 3 (80, 20, 66, 30, 87, 24) Germany – 1 (35, 67, 66, 30, 87, 24) France – 1 ( 68, 71, 43, 86, 63, 48) India – 1 (77, 48, 56, 40, 51, 26) Iran – 1 (58, 41, 43, 59, 14, 40) Japan – 2 (54, 46, 95, 92, 88, 42) Mexico -1 (81, 30, 69, 82, 24, 97) Russia – 1 (93, 39, 36, 95, 81, 20) US – 2 (40, 91, 62, 46, 26, 68) Sample Group Values • • • • • • Canada FR – 1 (54, 73, 45, 60, n, n) Germany – 1 (35, 67, 66, 30, 87, 24) Greece – 1 (60, 35, 57, 112, 45, 50) Philippines – 1 (94, 32, 64,44, 27, 42) UK – 2 (35, 89, 66, 35, 51, 69) US – 6 (40, 91, 62, 46, 26, 68) 73
  • 74. Results (2) Results of Research Question Two Control Group 2004 Data Smoothing _______________________________________________________________________ Hypothesis # Test Tool U= Z= p-value Accept/Reject _______________________________________________________________________ (PDI) H20, H21 μ >= 59 Mann-Whitney 109.5 -2.14 0.0162 Reject (IVC) H20, H22 μ <= 45 Mann-Whitney 35.5 2.19 0.0143 Reject (M/F) H20, H23 μ <= 50 Mann-Whitney 78 -0.32 0.3745 Accept (UAI) H20, H24 μ >= 68 Mann-Whitney 80.5 -0.46 0.3228 Accept (STO) H20,, H25 μ >= 45 Mann-Whitney 107.5 2.52 0.0059 Reject (IVR) H20, H26 μ <= 45 Mann-Whitney 20.5 2.77 0.0028 Reject _______________________________________________________________________ 74
  • 75. Results (2) PDI IVC M/F UAI LTOvSTO IVR _________________________________________________________ 1 1 0 0 0 (1) 0 (1) _________________________________________________________ Note. 0 indicates the null hypothesis was accepted for the dimensional question and 1 indicates that the null hypothesis was rejected. 75
  • 76. Results - PDI (2) Control Data PDI - 2012 Sample Data PDI - 2012 9 12 8 10 7 6 8 5 6 4 3 4 2 2 1 0 0 low PDI Neutral high PDI low PDI Neutral high PDI 76
  • 77. Results – IVC (2) Control Data IVC - 2012 Sample Data IVC -2012 8 14 7 12 6 10 5 8 6 4 4 3 2 2 0 1 0 Collectivist Neutral Individualist 77
  • 78. Results – M/F (2) Control Data M/F - 2012 Sample Data M/F - 2012 10 9 8 7 6 5 4 3 2 1 0 14 12 10 8 6 4 2 0 Feminine Neutral Masculine Feminine Neutral Masculine 78
  • 79. Results – UAI (2) Control Data UAI - 2012 Sample Data UAI - 2012 10 9 8 7 6 5 4 3 2 1 0 12 10 8 6 4 2 0 low UAI Neutral high UAI low UAI Neutral high UAI 79
  • 80. Results – IVR (2) Control Data IVR - 2012 Sample Data IVR - 2012 7 12 6 10 5 8 4 6 3 4 2 1 2 0 0 Restrained Neutral Indulgent Restrained Neutral Indulgent 80
  • 81. Conclusions • Results – Statistically significant relationship between high PDI and low IVC dimensions and nationalistic, patriotic themed website attacks. – Statistically significant relationship between low PDI and high IVC dimensions and “lone wolf” attacking behaviors. – Notable observations in IVR and UAI. • Next Steps – Expand using larger datasets. • Correlational studies pdi data from zone-h.org – Focus questions for other dimensions examining for cultural traces in other activities such as software coding, malware behaviors, attack strategies or TTPs… • UAI malware • UAI coding errors September 2013. (c) Copyright 2013. All rights reserved. 81
  • 82. Conclusion • There appears to be relationship between culture and certain CNA behaviors. • • Means testing using Mann-Whitney verified 2 of 6 dimensions. An even more interesting finding was the lack of activity in certain ends of specific dimensions. • • • • • September 2013. Low power distance Individualism High uncertainty avoidance Short term orientation Indulgence (c) Copyright 2013. All rights reserved. 82
  • 83. Thank you! Dr. Char Sample csample@cert.org or charsample50@gmail.com CERT/NetSA 2013 September 2013. (c) Copyright 2013. All rights reserved. 83
  • 84. Cultural Research • Dr. Dominck Guss (Guess, 2004) – Funded in part by NSF to examine cognitive processing. – Discussed basic assumptions then asked (2011) • “Does culture influence how students learn”? • If so “does this leave traces”? – Pointed to Dr. Hofstede’s work and sent some papers my way. • Dr. Dominik Guss & Dietrich Dorner (2010) observed that culture influences problem perception, strategy development and the decision choices. • This mental software is subconsciously used during problem solving situations (Hofstede 2001, Guss, & Dorner 2010). September 2013. (c) Copyright 2013. All rights reserved. 84
  • 85. Cultural Research • Guss’s (continued): – Findings (continued) • Guss and Wiley (2007) noticed that novel problems resulted in the problem solvers relying on culturally developed and learned strategies to solve the problem. • “Strategies were even stronger predictors of performance than the control variables computer experience and intelligence” (2011). • Culture influences: perception, categorization, and reasoning (2011). • Other’s – Berry (2004) and Strohschneider (2001) also observed that development of problem solving strategies vary by culture. – Bornstein, Kugler, & Ziegelmeyer (2003) observed cultural differences with decision making in game playing experiments. September 2013. (c) Copyright 2013. All rights reserved. 85
  • 86. Parameters of Culture • Parameters – Does not reflect differences between individuals. – Statements about cultures are general and relative. – The appeal of culture lies in the fact that the people’s thought processes subconsciously reflect their cultural background. • While not great for individual hacker attribution it has cyberwar implications: defensive and offensive. • Markers, if they exist, should reveal themselves, even with re-used attacks. September 2013. (c) Copyright 2013. All rights reserved. 86
  • 87. Research Plan(2) • Why inferential quasi-experiment vs correlation or causal research plans. – The type of data available largely determines the method. • Unable to meet academic criteria for data with any accuracy. – Choosing quantitative research limited options. • Quantitative chosen controversy that it can generate was chosen due in part to the nature of this study. September 2013. (c) Copyright 2013. All rights reserved. 87
  • 88. Conclusion • This approach relies on unconscious thought patterns of attackers that have been institutionalized through national education systems. • This researcher hopes to provide evidence that culture does play a role in CNA choices and behaviors. • The literature reviewed supports the hypothesis, data is currently being collected. • There is much more work to be done, if this hypothesis proves correct. • The current study, while promising is limited in scope, more information is needed on each dimension and associating attacks within each dimension. September 2013. (c) Copyright 2013. All rights reserved. 88
  • 89. In Other Words • System 360 September 2013. • Google (c) Copyright 2013. All rights reserved. 89
  • 90. Results - PDI (2) Control Data PDI - 2004 Sample Data PDI - 2004 6 10 9 8 7 6 5 4 3 2 1 0 5 4 3 2 1 0 low PDI Neutral high PDI low PDI Neutral high PDI 90
  • 91. Results – IVC (2) Control Data IVC - 2004 Sample Data IVC -2004 6 12 10 5 8 4 6 3 4 2 2 0 1 0 Collectivist Neutral Individualist 91
  • 92. Results – M/F (2) Control Data M/F - 2004 Sample Data M/F - 2004 9 12 8 10 7 6 8 5 6 4 3 4 2 2 1 0 0 Feminine Neutral Masculine Feminine Neutral Masculine 92
  • 93. Results – UAI (2) Control Data UAI - 2004 Sample Data UAI - 2004 7 10 9 8 7 6 5 4 3 2 1 0 6 5 4 3 2 1 0 low UAI Neutral high UAI low UAI Neutral high UAI 93
  • 94. Results – IVR (2) Control Data IVR - 2004 Sample Data IVR - 2004 6 9 8 5 7 4 6 5 3 4 2 3 2 1 1 0 0 Restrained Neutral Indulgent Restrained Neutral Indulgent 94

Hinweis der Redaktion

  1. Quantitative analysis is key here b/c the goal is to ultimately show that this behavior is patterned. If qualitative analysis provides detail into specific behaviors, quantitative analysis provides the abstractable component that allows us to begin determining the patterns for understanding and predicting.
  2. Studies detail Chinese hackers, Russian hackers, Iranian hackers, US hackers, etc. Technology usage differs by culture (Kohun et al, 2012; Mandl, 2009; Sanchez-Franco et al., 2009).
  3. Not enough data points to do a correlational or causal study.Lack the foundation for correlational or causal study
  4. This is relevant for future honeypot or honey net work! Western: “rule based”, “logic”, “de-contextualized”Eastern: “associative”, “intuitive”, “context”Study results:Eastern gathers all information, prefers intuitive thinking.*Western gathers information deemed relevant to problem at hand, no preference between intuitive and rule based.
  5. ** This marker also overlaps IDV – same result different causeEducation – high PD Teacher centered learning, teacher is always right and must be respected.Education – low PD Student centered learning, student independence is the goal, quality is measured by Student performance.
  6. *Creativity also overlaps Uncertainty avoidanceEducation Indiv- learn how to cope w/ unforeseen problems, lifelong learning.Education Collec- adaptation of skills necessary to fit into the group, learning is finite and for the young.
  7. *.Attack strategies: Progressive (changing targets) vs stopping at destination target.Best defense is a good offense vs defend protect.Progressive (changing targets) vs stopping at destination target.Best defense is a good offense vs defend protect.Boasting vs doing required 0
  8. Partial list of values for ukraine ltovsto=86 iv=14
  9. *EducationLow: vague objectives, broad assignments, no time tables, reward originality, &gt;1 correct answer, inductive reasoningHigh: structured learning w/precise objectives, detailed assignments, strict timetables, only 1 correct answer, deductive reasoning.TechnologyLow: better at invention worse at implementationHigh: worse at invention better at implementationAttack behaviorsTool preferences? Blind spots in defenses?
  10. Scale 8-112
  11. 2 items of note here Flame, duqu and Stuxnet (precision is associated w/ High Uncertainty Avoidance) probabilistic attacks low UAI?
  12. Scale 8-112
  13. Education:LTO: Strength in applied concrete sciences, practical knowledge importance, success or failure reflects work effort.STO: Pride in own country, talent in theoretical abstraction, success or failure reflects luck.Attack BehaviorsThis dimension deals with strategies, data will need to rely on intrusion sets vs single attacks.
  14. EducationRestrained: Better at math, science, and logical reasoning.Indulgent: Negative correlation between math performance and indulgence.Subject expertise versus superficial learning.Attack Behaviors
  15. Probability value
  16. Different scales on LHS reflect difference in frequency not distribution. Answering not “how much” but “where”
  17. Different scales on LHS reflect difference in frequency not distribution. Answering not “how much” but “where”
  18. Distribution of Sample data w/ the extra data pieces becomes more “normal”Values become more firmly entrenched. Population is shifting to the right… high power distance
  19. Lack of activity on the low end of the pole.
  20. This data looks more impressive than it actually is. The original sample set was small, further reduction may have resulted in creating “unstable” results.
  21. Bullet 1: Examines cultural impact on CPS or DDM; also how terrorists are created.