Asymmetries

Asymmetries

Reference : Network Attacks and Exploitation by Matthew Monte

False Asymmetries

Cost

Cost alot for both of attackers and defenders.

Attribution

Cyber Attribution is the process of tracking, identifying and laying blame on the perretrator of a cyber attack or other hacking exploit. Finding the target and catching the attacker is pretty much the same. And even penalties different via countries.

True Asymmetries Advantage for attacker

Motivation:

Attacker: costs but there is a huge payoff potential and little risk. Gains are immediate and tangible

Defender: Nothing to gain, only something to lose. Loss is often intangible from nothing to catastrophic.

This diffrerence creates an imbalance in motivation even if the law comes in, monotony makes defender less motivated than attacker.

Initiative:

Is ability to make threats or take actions that require your opponent to react. Motivation : mental States. Initiative : measures ability. Attacker acts and Defender reacts —> means that the Attakcer can stay one step ahead.

Focus:

Attacker: has a sigle mission and point of focus. Has a feedback coming from the accomplishments and failures

Defender: Split focus between securing the network and running it. Lack positive feedback. Cannot prove a negative.

Effect of failure:

Preventing an attack may have no effect wthasoever on the attacker

Honeypot is a computer network designed to entice attackers in to trick them into exposing a larger cadre of tools and methods in the hopes of inflitcing a cost; histrically been expensive.

Attacker: loss almost non-existent; time and small amount of cost. May apply the failure to make the next step

Defender: a lot. No idea how would be the next step be.

Knowledge of Tech:

Attacker : There are but a limited number of typical setups and the Attacker has seen them all. Full time spending studying offense and even defense. Urgency for defender is different.

Defender: must learn defensive methods and tech to stay current and to maintain compliance.

The gap comes from the motivation and eagerness on learning more stuff.

Analysis of opponent:

On general, Attackers can acquire, analyze, and test against solutions of security software before deploying their attack tools,

Attacking tools cannot be purchased, but must be captured. Must detect and capture tool for analysis, but need to analyze it to detect and capture.

Tailored Software:

Attackers have an advantage in creating and deploying pointy-end software. The development cycle can be condensed and it is under their own control. However, this advantage is not inherent.

The defensive security market is actively researching and developing defensive architectures that can be
quickly tailored to specific environments under the buzzword adaptive defense. Results so far have been muted, but it is in the early stages. If and when a true adaptive defense is achieved, the Attackers’ advantage will dissipate.

Rate of Change

When software is updated, if new features are added, there’s a decent chance new vulnerabilities will be introduced.

The rate of change and the resultant shaky foundation it creates offers a renewing stream of vulnerabilities that is to the Attacker’s advantage.

True Asymmetries Advantage Defender

Network Awareness

Defender: has full access to every details such as switch, router, firewall…

Attacker: cannot acquire the same level of detail with the same level of Defender’s effort

Network Posture

microsacle ig. Address Space layout Randomization (ASLR)

Defender: has full right to construct the Network attributes from policy to technological.

Attacker: harder to target the moving object.

Advantage Indeterminate for both

Time

Attacker: time to do overall operation. However it may allow them to be exposed. It may help but hurt at the same time.

Defender: Overall maintance, upgrade, RECON, …

Efficiency

Attacker: Cost of Acquiring Information vs Value of Information Acquired

Defender: Cost of Securing Information vs Value of Information Secured

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×