2.2 Hypothesis Considerations - MAD20 Threat Hunting & Detection Engineering Course

MAD20Tech
25 Apr 202406:40

Summary

TLDRThis lesson delves into the influence of bias in threat hunting, teaching how to recognize and mitigate its impact on intelligence reporting. It emphasizes the importance of being aware of cognitive biases like visibility and victim bias, and how defenders can introduce availability and anchoring biases. The lesson guides on formulating hypotheses, choosing attack techniques wisely, leveraging existing data, and engaging with the community to refine analytic approaches and avoid redundancy.

Takeaways

  • 🔍 Bias in threat hunting can occur and must be recognized to minimize its impact on intelligence reporting.
  • 🧠 Cognitive biases, such as visibility and victim bias, can skew the perception of the full scope of attacks.
  • 👀 Availability and anchoring biases can lead to a narrow focus on familiar or currently accessible data, potentially overlooking other important information.
  • 📝 Documenting and sharing assumptions with the team is crucial for validating and revisiting them during the analytic development process.
  • 🔑 When generating hypotheses, be specific about known facts, inferences, chosen hypotheses, discarded options, and the environment being defended.
  • 💡 Focus analytic efforts on techniques that are not commonly covered, have a significant impact if used, and leverage existing data collection for efficient implementation.
  • 🚀 Consider techniques that are not typically employed by users and system administrators to avoid high false alarm rates.
  • 🔎 Engage with the community and existing resources to avoid redundant work and to uncover potential flaws in your approach.
  • 🔗 Investigate if there are precursor, follow-on, or correlated techniques to the one being analyzed, as grouping them can improve precision and recall.
  • 🛠 Define the scope of the behavior under examination based on platforms, implementations, and functionality to focus research effectively.
  • ⚖️ Be prepared to revisit and adjust the scope as needed to ensure the full range of the technique is covered according to the environmental terrain.

Q & A

  • What is the main focus of lesson 2.2 in the provided transcript?

    -The main focus of lesson 2.2 is to discuss how bias can occur in threat hunting, how to recognize it, and considerations for choosing an attack technique on which to focus the hypothesis.

  • What is the significance of understanding cognitive biases in the context of threat intelligence reporting?

    -Understanding cognitive biases is crucial to minimize their impact in threat intelligence reporting, as they can lead to skewed analysis and false impressions of the full scope of attacks or activities.

  • Can you give an example of a cognitive bias mentioned in the transcript?

    -One example mentioned is visibility bias, which occurs when threat intelligence produced by an organization is only focused on the subset of adversarial activity that they can detect.

  • What is the importance of being aware of inherent biases in models used for threat hunting?

    -Being aware of inherent biases in models is important to ensure accurate and comprehensive threat analysis, as these biases can influence the focus and interpretation of data.

  • How can victim bias affect the threat intelligence reports?

    -Victim bias can affect reports by focusing more on high-profile victims and skewing the data based on what is allowed to be published, which may not represent the full range of threats.

  • What is the impact of novelty bias in the context of threat hunting?

    -Novelty bias can lead to more coverage and attention being given to new or flashy adversary groups, potentially overshadowing long-standing threats that may be more prevalent or significant.

  • Why is it important for threat hunters to document and share their assumptions with their team?

    -Documenting and sharing assumptions is important for validation and to revisit them through the analytic development process, ensuring a more accurate and objective threat hunting approach.

  • What is the advice given for focusing analytic efforts when choosing a technique in threat hunting?

    -The advice is to focus on techniques that are not already commonly used by adversaries, would create a significant impact if used successfully, and capitalize on existing data collection, documentation, or analytics.

  • Why is it beneficial to check for existing analytics, mitigations, or other defensive ideas online before conducting research?

    -Checking for existing work can save time and effort, help avoid redundant work, and may highlight gaps that can be focused on, leveraging the knowledge and findings of other security researchers.

  • What is the purpose of engaging with the community in the context of threat hunting?

    -Engaging with the community helps improve work by sharing new discoveries, getting feedback on approaches, and uncovering flaws early on, which can save time and prevent potential issues.

  • Why is it necessary to define the scope of the behavior when preparing to conduct research on a technique?

    -Defining the scope helps to focus research on relevant systems and behaviors, ensuring that the analysis is accurate and tailored to the specific environment and requirements of the threat hunting process.

Outlines

00:00

🕵️‍♂️ Bias in Threat Hunting and Hypothesis Considerations

This paragraph discusses the occurrence of bias in threat hunting and the importance of recognizing and addressing it. It mentions the MITRE ATT&CK Defender Cyber Threat Intelligence course, which covers cognitive biases that can affect threat intelligence reporting. The script emphasizes the need to be aware of inherent biases such as visibility bias, victim bias, and novelty bias. It also points out that defenders can introduce biases like availability bias and anchoring bias. The importance of documenting and sharing assumptions with the team is highlighted, as well as the need for specificity when generating hypotheses. The paragraph concludes with advice on choosing a technique to focus on, considering the return on investment, and leveraging existing data and analytics to minimize false alarms.

05:03

🔍 Technique Selection and Hypothesis Scoping

The second paragraph delves into the process of selecting and scoping techniques for threat hunting. It advises focusing on techniques that are not commonly covered, have a significant impact if used, and can be implemented easily without triggering many false alarms. The paragraph also suggests considering techniques that are not typically used by system administrators. It encourages researchers to check for existing analytics, mitigations, and defensive ideas to avoid redundant work and to engage with the community to improve their work. The importance of defining the scope of the behavior to be examined is highlighted, including considering factors like platforms, implementations, and functionality. The paragraph concludes by emphasizing the need to be aware of biases when developing hypotheses and the significance of technique choice and hypothesis scoping for setting up for success in the long run.

Mindmap

Keywords

💡Bias

Bias refers to a systematic error or deviation from a standard, often in judgment or decision-making. In the context of the video, bias is discussed as a potential issue in threat hunting and intelligence reporting, where it can lead to skewed perceptions or incomplete understanding of threats. The video mentions several types of cognitive biases, such as visibility bias, victim bias, and novelty bias, which can distort the analysis of threats.

💡Threat Hunting

Threat hunting is the proactive search for threats that have evaded initial detection by security measures. The video emphasizes the importance of recognizing and dealing with bias in this process to ensure accurate and comprehensive threat intelligence. Threat hunting involves generating hypotheses about potential threats and then seeking evidence to validate or refute these hypotheses.

💡Cognitive Biases

Cognitive biases are systematic patterns of deviation from rational judgment that occur due to the way the human mind processes information. The video highlights the relevance of cognitive biases in the field of cybersecurity, particularly in threat intelligence, where they can influence the interpretation of data and the prioritization of threats.

💡Visibility Bias

Visibility bias occurs when an organization focuses only on the subset of adversarial activity that they can detect, potentially leading to a false impression of the full scope of attacks. The video uses this term to illustrate how bias can affect the comprehensiveness of threat intelligence, as it may overlook threats that are not currently detectable by the organization's systems.

💡Victim Bias

Victim bias is a type of bias where reports tend to focus on more high-profile victims, potentially skewing the perception of threat severity or prevalence. The video script mentions this bias as an example of how the focus of threat reports can be influenced by the prominence of the victims, rather than an objective assessment of the threats themselves.

💡Novelty Bias

Novelty bias is the tendency to give more attention to new or novel information, often at the expense of more established or routine information. In the video, this bias is discussed in the context of cybersecurity, where new adversary groups may receive more coverage than long-standing ones, potentially leading to an overemphasis on newer threats.

💡Availability Bias

Availability bias is the tendency to rely on the most readily available information, often neglecting other potentially relevant data. The video describes how a threat hunter might fall into this bias by focusing only on the data they currently have access to, which could result in a skewed prioritization of techniques or threats.

💡Anchoring Bias

Anchoring bias is the tendency to rely too heavily on the first piece of information encountered when making decisions. In the context of the video, this bias can cause defenders to focus on initial reports or discussions, potentially overlooking other valuable data sources that could provide a more comprehensive understanding of threats.

💡Hypothesis

A hypothesis is a proposed explanation for a phenomenon, made as a starting point for further investigation. In the video, the development of hypotheses is a key part of the threat hunting process, where specific hypotheses about potential threats are formulated and then tested against evidence gathered through research and analysis.

💡Technique

In the context of cybersecurity, a technique refers to a specific method or approach used by adversaries to compromise systems or achieve their objectives. The video discusses the importance of choosing techniques to focus on in threat hunting, considering factors such as their prevalence, impact, and how they can be detected or mitigated.

💡Investment Return

The term 'investment return' in the video refers to the benefit or value gained from the effort and resources invested in a particular activity, such as threat hunting. The video advises focusing on techniques that are not commonly covered by adversaries or that could have a significant impact if successfully exploited, to ensure a good return on the investment of analytic efforts.

💡False Alarms

False alarms in cybersecurity are alerts triggered by security systems that incorrectly identify benign activity as malicious. The video mentions the need to balance the selection of techniques to avoid generating too many false alarms, which can lead to alert fatigue and reduced effectiveness of security measures.

💡Community Engagement

Community engagement in the video refers to the interaction with other security researchers and professionals to share findings, ideas, and to receive feedback. This engagement is encouraged as a way to improve work, avoid redundancy, and uncover potential flaws in approaches early on.

💡Scope

Scope in the context of the video refers to the boundaries or limitations set for a particular research or analysis project. Defining the scope is crucial for focusing research efforts effectively, and the video discusses factors such as platforms, implementations, and functionality that can help in determining the scope of the behavior under examination.

Highlights

Bias can occur in threat hunting and recognizing it is crucial.

Cognitive biases can be present in threat intelligence and user actions.

The goal is not to memorize all cognitive biases but to understand their impact.

Visibility bias gives a false impression of the full scope of attacks.

Victim bias skews focus towards high-profile victims.

Novelty bias leads to more attention on new adversary groups.

Defenders may introduce bias through availability, focusing only on accessible data.

Anchoring bias can cause defenders to miss useful information from other sources.

Threat hunters should document and share assumptions with their team for validation.

When generating hypotheses, be specific about what is known and inferred.

Focus analytic efforts on techniques not commonly used by adversaries.

Choose techniques that capitalize on existing data collection for easier implementation.

Avoid techniques that trigger too many false alarms in the system.

Engage with the community to improve work and avoid redundant efforts.

Consider precursor, follow-on, or correlated techniques for a comprehensive approach.

Define the scope of the behavior to examine within the context of desired factors.

Scoping helps in focusing research towards relevant systems and behaviors.

Be aware of biases when developing hypotheses and conducting research.

Technique choice and hypothesis scoping are crucial for setting up for success.

Transcripts

play00:00

hello and welcome to lesson 2.2

play00:03

hypothesis

play00:05

considerations in this lesson we will

play00:07

discuss how bias can occur in threat

play00:09

hunting as well as how to recognize it

play00:12

we'll also discuss considerations for

play00:14

choosing an attack technique on which to

play00:16

focus your

play00:18

hypothesis if you've already taken the

play00:20

miter attack Defender cyber threat

play00:22

intelligence course then you'll recall

play00:24

that it discusses cognitive biases

play00:27

namely the bias present in the threat

play00:29

intelligence itself as well as bias that

play00:31

we as users can

play00:33

introduce while there are dozens of

play00:35

known types of cognitive biases our goal

play00:38

in this section is not to memorize them

play00:39

all but to go through some examples to

play00:42

keep in mind as we discuss ways to deal

play00:44

with bias in order to minimize its

play00:47

impact in threat intelligence reporting

play00:50

and even in models such as attack

play00:52

inherent biases can be present and it is

play00:54

important to be aware of how they may

play00:56

present

play00:57

themselves one example is visibility

play00:59

bias

play01:00

which occurs when the threat

play01:01

intelligence produced by an organization

play01:03

is only focused on the subset of

play01:05

adversarial activity that they can

play01:07

detect which may give a false impression

play01:09

of the full scope of the attack or

play01:12

activity other examples of bias that can

play01:14

occur are victim bias where reports tend

play01:17

to focus on more high-profile victims

play01:19

and can be skewed based on what they

play01:21

actually allow to be published as well

play01:23

as novelty bias where for example a

play01:26

flashy new adversary group may receive

play01:28

more coverage and attention than a

play01:30

long-standing

play01:32

one there are also several ways that

play01:34

bias can be introduced by the defender

play01:36

themselves as an example availability

play01:39

bias can be introduced by a threat

play01:40

Hunter who is relying only on the data

play01:43

that they currently have access to in

play01:45

order to prioritize techniques or

play01:47

narrowly focusing on adversarial

play01:49

behaviors and techniques that they are

play01:51

already familiar with which could give a

play01:54

false sense of the importance or urgency

play01:56

of the threats at

play01:57

hand another example is an anchoring

play02:00

bias which can cause the defender to

play02:02

lose out on a lot of useful information

play02:04

provided by other data sources because

play02:06

they're solely focusing on those that

play02:08

have already been discussed or reported

play02:10

on there are many more types of bias

play02:13

that can occur in this environment and I

play02:15

would encourage you to continue to learn

play02:17

about them and how they could apply to

play02:18

threat

play02:19

hunting as threat Hunters we need to

play02:22

understand when we are making

play02:24

assumptions explicitly document and

play02:26

share them with our team to validate

play02:28

them and revisit them through our

play02:30

analytic development process this is

play02:33

especially important when determining

play02:34

what activity to hunt for and for

play02:36

generating

play02:38

hypothesis be specific about what you

play02:40

factually know from threat intelligence

play02:42

what you're inferring why you chose a

play02:45

particular hypothesis what other

play02:47

hypotheses you discarded or deprioritize

play02:50

and what you believe about the

play02:52

environment you are

play02:53

defending when choosing a technique

play02:56

there are many things to consider but

play02:58

what it essentially boils down to is is

play02:59

getting a good return on your investment

play03:02

we advise you to focus analytic efforts

play03:04

first on techniques that aren't already

play03:06

covered commonly used by adversaries or

play03:08

would create a big impact if

play03:10

successfully used on your

play03:12

systems also select techniques that

play03:14

capitalize on existing data collection

play03:16

documentation or analytics order that

play03:19

you anticipate will be relatively easy

play03:20

to implement and not trigger too many

play03:22

false alarms in your system for example

play03:25

techniques that typical users and system

play03:27

administrators don't employ you'll have

play03:30

to think through and find a good balance

play03:31

between these characteristics to

play03:33

determine how to best Focus your

play03:36

efforts once you've chosen a technique

play03:38

consider the following questions as you

play03:40

prepare to conduct your

play03:41

research keep in mind that you aren't

play03:43

alone in this work many security

play03:46

researchers have investigated techniques

play03:48

and published their findings and ideas

play03:50

so read up on what others have done so

play03:52

you don't end up doing redundant work

play03:54

check for any other existing analytics

play03:56

mitigations or other defensive ideas

play03:59

online as associated with this Behavior

play04:01

attack car Sigma the threat Hunter

play04:04

Playbook and countless others are freely

play04:06

available and often contain excellent

play04:08

information and specific analytics and

play04:10

mitigations for these malicious

play04:12

behaviors searching those first can help

play04:15

save you a lot of time and effort and

play04:17

may help highlight a gap that you can

play04:18

focus your time

play04:20

on engaging with the community on your

play04:22

ideas is also a great way to help

play04:24

improve your work if you've discovered

play04:27

something new you can share with others

play04:29

if there's a flaw with the approach

play04:31

engagement can help uncover it early and

play04:33

save you trouble down the

play04:35

road in this course we focus on a single

play04:38

technique at a time for Simplicity you

play04:40

should consider if there are precursor

play04:42

followon or correlated techniques to the

play04:45

one you're investigating and think about

play04:47

grouping them together during your

play04:48

analytic

play04:49

approach there may be two techniques

play04:51

that in isolation have a high false

play04:53

alarm rate but when seen together more

play04:56

likely indicate malicious activity the

play04:59

converse may also be true in both cases

play05:02

grouping related techniques can help

play05:04

with precision and

play05:06

recall in addition to techniques that an

play05:08

adversary may use in conjunction with

play05:10

each other it's also worth examining

play05:12

other means through which an adversary

play05:14

can accomplish their goal in other words

play05:16

their plan

play05:17

B what other techniques exist in the

play05:20

same

play05:21

tactic another key item at this point is

play05:24

to define the scope of the behavior we

play05:26

want to examine which we can do in the

play05:28

context of factors we'd like to support

play05:30

such as platforms implementations and

play05:34

functionality limiting your scope to one

play05:36

or more platforms will help to focus our

play05:38

research towards relevant systems which

play05:40

should be dictated by the environmental

play05:43

terrain scoping based on implementation

play05:45

method is also useful at this stage as

play05:47

we may for example wish to exclude

play05:50

invocations that rely on deprecated

play05:52

commands or other methods not relevant

play05:54

to our

play05:55

systems finally intended functionality

play05:58

is also a good scope scoping Factor at

play06:00

this point as it can help determine what

play06:02

types of behavior to include or exclude

play06:04

in your research for example whether or

play06:07

not to support remote

play06:09

execution as you continue in this

play06:11

process you may have to revisit this

play06:13

step and narrow or expand your scope as

play06:15

needed in order to ensure you're finding

play06:18

the correct behaviors that cover the

play06:19

full range of the technique in

play06:21

accordance with your

play06:23

terrain to summarize it's important to

play06:26

be aware of biases When developing

play06:28

hypotheses and while you're conducting

play06:30

your research technique choice and

play06:32

hypothesis scoping are also important

play06:34

aspects of this process that will help

play06:36

set you up for Success later on down the

play06:38

road

Rate This

5.0 / 5 (0 votes)

Связанные теги
Threat HuntingBias AwarenessCognitive BiasesAttack TechniquesThreat IntelligenceHypothesis BuildingAnalytic MethodsSecurity ResearchDefensive StrategiesCybersecurity Education
Вам нужно краткое изложение на английском?