traps, pitfalls, swindles, lies, doubts and suspicions:
DESCRIPTION
Traps, Pitfalls, Swindles, Lies, Doubts and Suspicions: A Counter-Case for the Study of Good Etiquette Jack L. Edwards & Greg Scott A I Management & Development Corp. Sharon McFadden & Keith C. Hendy Defence Research & Development Toronto. Defence R & D Canada - Toronto. Etiquette. - PowerPoint PPT PresentationTRANSCRIPT
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Traps, Pitfalls, Swindles, Lies, Doubts
and Suspicions:A Counter-Case for the Study of
Good Etiquette
Jack L. Edwards & Greg ScottA I Management & Development Corp.
Sharon McFadden & Keith C. HendyDefence Research & Development Toronto
Defence R & D Canada - TorontoDefence R & D Canada - Toronto
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Etiquette
⢠A Nice Image
⢠Context: Human & System Etiquette
⢠Benevolence Assumption
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Some General Rules of Etiquette
⢠Be helpful ⢠Be respectful
⢠Be relevant ⢠Be prompt
⢠Be brief ⢠Be protective (of
privacy)
⢠Be pleasant ⢠Be adaptable
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Foundational Rule
⢠Foundational Rule of Etiquetteâ Assumption of Honesty (âBe honestâ)
⢠Benevolence Assumption
⢠High Correlation With Some Overlap in Meaning
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
The Internet: Ubiquitous and Evolving
⢠Work & Leisure Time Extends Beyond Local Processing
⢠Increasing Involvement of Technology in Person-To-Person Exchanges
â E.g., email; chat-rooms; video conferencing
⢠Modern Agents Increasingly Software and Internet-Based
⢠Traps, Pitfalls, Swindles Generalize Easily to the Internet
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Violations of the Foundational Rule:Traps, Pitfalls, Swindles, Lies...
⢠Nigerian Fee Scam
⢠On-line Credit Card Fraud in 2001 â (5% of online consumers)*
⢠Merchantâs lost $700M in 2001*
⢠Lies & Hoaxes (Bushâs IQ)
* Gartner Group
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Thorough Understanding of Etiquette Is Not Possible Without An
Active Study of the Abuse of Good Etiquette⢠Focusing Only on Good Etiquette Prejudices Us Toward
Assumptions of Benevolence
⢠Actively Assume Mantle of Hacker, Vandal, Scam Artist, Thief or Terrorist
â Explore how to enlist rules of etiquette in deception & fraud
⢠Active Contemplation Will Engage the Mind in a Creative Pursuit of a Deeper Understanding of Etiquette
â Norman & Rumelhart Example
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Applying Etiquette Rules in the Service of Scams & Frauds
⢠Be helpful ⢠Be respectful⢠Be relevant ⢠Be prompt⢠Be brief ⢠Protect privacy⢠Be pleasant ⢠Provide options
⢠Give the Appearance of Honestyâ Falsely Establish Credibility
⢠Some Examples of Grfter Etiquette
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Fraud, Vandalism, Theft & Terrorism on the Internet
⢠Ubiquitous Computing Is Giving Rise to Ubiquitous âUnderworldâ Activity
⢠Generalization of Classic Con Games is Underwayâ Ponzi schemes â Identity Theftâ Affinity Fraud â Insider Tradingâ Badger Game â Twice-fleeced Fraudâ Embezzlement â Weights and Measures Frauds
⢠Segmentation & Other Refinement Techniquesâ Mark (or Victim) Categories
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Generalizing Grifter and Other Criminal Agents
⢠Current & Future Software Agentsâ Roper Agents â Manager Agentâ Inside Man Agent â Forger Agentâ Shill Agents â Vandal Agents
⢠Humans, Corporations & Other Organizationsâ The Target, Victim or Mark
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Generalizing âBig Conâ Grifters to Software
⢠Roper Agents - Automated Solicitations (e.g., Nigerian Fee Scam)
⢠Inside Man - Remotely Controlled & Coordinated Attack Agents
⢠Manager - External Automated Attack Agents on Distributed Machines
⢠Shills - Support Agents in a Society of Grifter Agents
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Malicious Software Agents (Zeltser, 2000)⢠Rapidly Spreading Agents
â Viruses and Worms - Explicitly Copy Themselvesâ e.g. Melissa Virus and Morris Worm
⢠Spying (Espionage) Agentsâ Transmits Sensitive Informationâ e.g. Caligula, Marker and Groov Viruses
⢠Remotely Controlled Agentsâ Complete Control of Victimâs Machineâ Client/Server Architecture
⢠Server Communicates with Attacker through Outbound HTTP & FTP Channels⢠Client directs Agent through Inbound Email and Web Browsing Channels⢠Programming API Permits Controlling Traffic to be Encrypted with Plug-Ins⢠Plug-Ins Permit Newly Propagated Versions to Register with Home-Base
â e.g. Back Orifice and NetBus
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Malicious Software Agents (Zeltser, 2000) (continuedâŚ)
⢠Coordinated Attack Agentsâ Complete Control of Victimâs Machineâ Client/Server Architecture
⢠Multiple Clients Operate from Compromised Machines⢠Difficult to Trace
â e.g. Trinoo and TFN
⢠Advanced Malicious Agentsâ Builds on Strengths of Previously Described Agentsâ Alleviates Their Weaknessesâ e.g. RingZero Trojan
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Veracity Agent Network (VAN) - A Society of Protection Agents -
⢠Monitoring Agents - Incoming/Outgoing Traffic & Unusual Local Activity
⢠Filtering Agents - Filters (Blocks) Unwanted Activity⢠Masking Agents - Masks Identify (Hides or Falsifies)⢠Tracking Agents - Track & Identify Unknown Sources⢠Information Agents - Explains Activities to Users⢠Proactive Agents - Build User Profiles of Attackers;
Report Violations; Alter Code of Intrusive Agents; Search & Destroy
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
VAN Functionality: Ensuring Good âUnderworldâ Etiquette?
⢠Monitoring, Intercepting & Controlling Cookie Traffic
⢠Monitoring Automatic Version Checkers Sending Personal Info to Company Sitesâ (e.g. usage statistics correlated with software Serial No.)
⢠Blocking Unwanted Transmission of Personal Info â (e.g. credit card numbers, email address)
⢠Stripping Browser Type, Platform & OS Info Sent With Every Request for Web Page
⢠Blocking Banner Ads; Automatic Closing of Pop-Up Ads
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Current Level of Development: Monitoring Agents
⢠Internet Traffic Can Be Intercepted Either: â leaving an application & passing to the OSâ leaving the OS & passing to network
⢠Both Require Low-Level Drivers to Intercept Data
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Current Level of Development: Monitoring Agents (continuedâŚ)
⢠Look Up IP Addresses Automatically Using âwhoisâ
⢠Determine Usage Stats Being Collected, by RealPlayer
⢠Port Number Look-Up (65K+ Ports): Identify Type of Traffic Using Ports & Build a DataBase
⢠Identify Information Sent Out Without Asking Userâ cookiesâ software update requestsâ AOL messenger activityâ usage stats
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Current Level of Development: Monitoring Agents (continuedâŚ)
⢠Outside Attempts to Access System
⢠Personal Info Being Sent Outâ e.g. credit card numbers; email addresses; passwords
⢠System Info Sent Out While Web Browsingâ e.g. browser type, operating system, type of computer
⢠Monitor Email to...â identify common Internet hoaxes & scamsâ compile statistics on incoming messages for future use
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Support Technology
⢠NetTraffic & WinpCap - Monitors Low-Level Event Traffic on PC
⢠Current Open Source Code from Politecnico di Torinoâ http://winpcap.polito.it/
⢠Original UNIX Pcap Developed at Berkeley
⢠Higher-Level Functionality is Needed to Interpret & Use That Information
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
User Requirements
⢠Protection Only - Donât Bother Me With Details
⢠Track Activities (At Least in the Beginning)
⢠See Explanations of Activity; ID Sources; Report Intrusions & Misuse of Information
⢠Be Proactive Realtive to Intruders
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
âUserâ Models
⢠For Actual User (Encrypted)
⢠For Several Masked Versions of Own User
⢠For âFriendsâ of Own User
⢠For Tracked (Potentially Malicious) Sources
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
Possibility of Agent Wars⢠Disseminate Info Other Agents Created To Block
⢠Misrepresent Themselves For Nefarious Purposes
⢠Hack Other Agents to Prevent Them from Achieving Competing Goals
Artificial Intelligence Management and Development CorporationArtificial Intelligence Management and Development Corporation AI M
The Future of âUnderworldâ Internet Computing
⢠âUnderworldâ of the Internet - The âWild Westâ
⢠Few Rules and Little Explicit âConsideration of Others,â as We Defined as the Source of Good Etiquette
⢠Helplessness of Average User to Protect Themselves From This âUnderworldâ Activity Will Help Drive Etiquette
⢠Our Goal: Agents to Help Ensure You Are âTaken Into Consideration,â in this New World of Ubiquitous Internet Computing