º£½Ç´óÉñ

º£½Ç´óÉñ / Text

Opinion: Cybersecurity needs an offensive playbook

In order to beat malicious hackers, the cybersecurity community must develop innovative approaches forÌýdeploying – and automating – offensive strategies to find and fix software vulnerabilities.ÌýÌý

By David Brumley , Contributor

What do recentÌýpolitical hacks, the massive cyberattacks thatÌýtook down a wide swath of the internet, and digital assaults on a portion of theÌýUkrainian power gridÌýhave in common?

All of them reveal that attackers are far ahead of defenders when it comes to digital security.ÌýBut with global investment in cybersecurityÌýexpected to top $1 trillionÌýover the next five years, why are the government agencies and companies charged with defending public networks and corporate systems so far behind?

It's simple: Cybersecurity defenders aren't playing enough offense.

The traditional way of thinking about cybersecurity has been that you can only have good a digital defense if you "build secure from the ground up." But this approach assumes a perfect world where everyone constructs bulletproofÌýcomputer programs. That's a fantasyland.

Instead, cybersecurity is more like sports. You have to excel at both offensive and defensive strategies to win.

This doesn't mean that information security firms and independent researchers should start launching attacks on adversaries. But the good guys need to be more aggressive about finding and fixing vulnerabilities in systems and networks before malicious hackers uncover and exploit them.

Think about it this way: Defensive teams in sports improve their skills by practicing against offensive teams, studyingÌýtheir plays, and understanding their approaches. We need this kind of tactic for improving cybersecurity across the board.Ìý

In the digital security business, the skill set between offensive and defensive groups are strikingly similar. Both sides want to discover flaws first. But to build more robust offensive teams – for seeking out vulnerabilities inÌýgovernment or business networks – and defensive ones – for building the barriers and fighting off the malicious hackers – we need to invest more heavily in automation.

We need automatic toolsÌýthat play offense – tools thatÌýcan check every program, system, and piece of critical infrastructure for flaws. These will become more essential as theÌýnumber of hackable devices – cars, medical equipment, industrial machinery, and home electronics –Ìýis exploding.

Many wireless routers, for instance, areÌýladen with security bugs. There are hundreds of different routers, and examining each one for security flaws by hand is not possible. But we could program computers to hunt down those bugs.

Earlier this year, the cybersecurity community witnessed its equivalent of the moon landing: The Defense Advanced Research Projects Agency (DARPA)Ìýshowed thatÌýcomputersÌýare capable of autonomously deploying offense and defense in battles between supercomputers. The event dubbed the "Cyber Grand Challenge" paved the way for a new era of machines defending against computer attacks.

During the challenge that took place over nearly 10 hours in a Las Vegas conference hall, seven competing computer systems autonomously detected, evaluated, and patched software vulnerabilities before other competing systems had a chance to exploit them in a classic cybersecurity exercise known as Capture the Flag. It was the first all-computer hacking contest, and its success illustrated the potential of automation in cybersecurity.Ìý

Right now, most companies rely on a small number of security analysts to test their products, so countless vulnerabilities go unnoticed. The Cyber Grand Challenge showed that in the not-too-distant future, it will be possible for companies to use automated tools to find and fix software vulnerabilities much faster, and at scale.

Even though cybersecurity automation will eventually make everyone safer,Ìýwe still need skilled engineers to build these kinds of systems.ÌýThe computer security field is projected to grow 50 percent faster than computer science in general, and more than 200 percent faster than average jobs. And demand is quickly outpacing supply.

Burgeoning efforts within government, from foundations, and private sector toÌýfocus on innovation and training are helping. We need more smart people building automatic systems that can work harder and faster – on both defense and offense – than even the most skilled hackers.Ìý

David Brumley is the director of CyLab Security and Privacy Institute and the Bosch Distinguished Professor in Security and Privacy Technologies at Carnegie Mellon University. He's also chief executive officer ofÌýForAllSecure.ÌýFollow him on TwitterÌý@thedavidbrumley.