diff --git a/_posts/2024-04-23-adversaries-sometimes-compute-gradients.md b/_posts/2024-04-23-adversaries-sometimes-compute-gradients.md index b4c31234f085..a424f1bcbd23 100644 --- a/_posts/2024-04-23-adversaries-sometimes-compute-gradients.md +++ b/_posts/2024-04-23-adversaries-sometimes-compute-gradients.md @@ -52,14 +52,14 @@ The story of attack | defense asymmetry lives on. -Would you rather navigate the landscape on the right in the more nimble flywheel or the one that changes direction more slowly? Inspiration taken from understanding complexity: []'simple, rugged and dancing landscapes'.](https://www.youtube.com/watch?v=3FyzOba2cUE&t=3s) People often make the mistake of assuming their business landscape and an attackers goals within it are like reaching the peak of Mount Fuji, but often its more like navigating the Appalachias, where its hard to judge where the peaks are from the different vantage points. +Would you rather navigate the landscape on the right in the more nimble flywheel or the one that changes direction more slowly? Inspiration taken from understanding complexity: ['simple, rugged and dancing landscapes'.](https://www.youtube.com/watch?v=3FyzOba2cUE&t=3s) People often make the mistake of assuming their business landscape and an attackers goals within it are like reaching the peak of Mount Fuji, but often its more like navigating the Appalachias, where its hard to judge where the peaks are from the different vantage points. ## Building my adversary flywheel ### Step 1: Create a data flywheel Attackers need to use more ML in their day to day. To really do that, they have to start building their flywheel and using ML adversarially and offensively. -Not just because blue teams are doing it, but because true adversaries are heavily invested in the space. When we look beyond 'cyber-criminals' we see that there are adversaries with the backing of multiple universities, dedicated ML teams and research teams. They take an active interest in understanding how to use ML both adversarially and offensively. For an actual well thought out take on reevaluating attacker capabilities, and if this approach is right for you, see []'are we really helping'](https://jackson-t.com/are-we-helping/) by the venerable [Jackson-t.](https://twitter.com/jackson_t?lang=en) +Not just because blue teams are doing it, but because true adversaries are heavily invested in the space. When we look beyond 'cyber-criminals' we see that there are adversaries with the backing of multiple universities, dedicated ML teams and research teams. They take an active interest in understanding how to use ML both adversarially and offensively. For an actual well thought out take on reevaluating attacker capabilities, and if this approach is right for you, see ['are we really helping'](https://jackson-t.com/are-we-helping/) by the venerable [Jackson-t.](https://twitter.com/jackson_t?lang=en) To start, you need a data flywheel. Projects like [red team telemetry](https://github.com/ztgrace/red_team_telemetry), [redELK](https://github.com/outflanknl/RedELK) and [nemesis](https://wiki.offsecml.com/Offensive+ML/Flywheels/Nemesis) (a red team 'flywheel') which is enabling red teams to begin to build a database of attack telemetry for future use, like in ML or for static / dynamic evasion techniques, and creating a data pipeline for analysis and so on. But that's just one piece of the puzzle; we need more ML driven data inputs and techniques in play. @@ -73,13 +73,23 @@ Your immediate criticism of this might be "but ml is just one layer in a highly We see in the following example diagrams for phishing detection and anti virus detection that ML detections are just 1 small component of the detection stack. Fixating on that won't get you very far on its own. - - +
phishing workflow simplified?
+av workflow simplified
+