Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

Sandia National Laboratories' computer science researcher Jeremy Wendt wanted to figure out how to recognize potential targets of nefarious emails, and put them on their guard. His goal is to reduce the number of visitors that cyber analysts have to check as possible bad guys among the tens of thousands who search Sandia websites each day.

Ultimately, he wants to be able to spot spear phishing. Phishing is sending an email to thousands of addresses in hopes a few will follow a link and, for example, fall for a scam offering millions of dollars to help a Nigerian prince wire money out of his country. Spear phishing, on the other hand, targets specific email addresses that have something the sender wants.

Wendt has developed algorithms that separate robotic web crawlers from people using browsers. He believes his work will improve security because it allows analysts to look at groups separately.

“Even if an outsider gets into a Sandia machine that doesn’t have much information, that access makes it easier to get into another machine that may have something,” Wendt said. “Spear phishing is scary because as long as you have people using computers, they might be fooled into opening something they shouldn’t.”

Identifying malicious intent

Sandia cyber security’s Roger Suppona said, “The ability to identify the possible intent to send malicious content might enable security experts to raise awareness in a potential target. More importantly, we might be able to provide specifics that would be far more helpful in elevating awareness than would a generic admonition to be suspicious of incoming email or other messages.”

Wendt, in the final stretch of a two-year Early Career Laboratory Directed Research and Development grant, presented his work at a Sandia poster session.

Wendt has looked into behaviors of web crawlers and browsers to see if that matched how computers identify themselves when asking for a webpage. Browsers generally say they can interpret a particular version of HTML — HyperText Markup Language, the main language for displaying webpages — and often give browser and operating system information. Crawlers identify themselves by program name and version number. A small number Wendt labels “nulls” offer no identification, perhaps because the programmer omitted that information or because someone wants to hide. What Wendt was looking for was a computer that didn’t identify itself, or say it’s one thing but behaved like another and trolled websites that the average visitor showed little interest.

Going to an Internet site creates a log of the search. Sandia traffic is evenly divided between web crawlers and browsers. Crawlers tend to go all over; browsers concentrate on one place, such as jobs. Also known as bots, these crawlers are automated and follow links like Google does.

“When we get crawled by a Google bot, we aren’t being crawled by one visitor, we’re being crawled by several hundreds or thousands of different IP addresses,” Wendt said.

Distinguishing bots and browsers

Since Wendt wants to distinguish bots from browsers, without having to trust they’re who they say they are, he looked for ways to measure behavior.

The first measurement deals with the fact that bots try to index a website. When you type in search words, the crawler looks for pages associated with those words, disregarding how they’re arranged on a page. This means a bot pulls down HTML files far more often.

Wendt first looked at HTML downloads. Bots should have a high percentage. Browsers pull down smaller percentages. More than 90 percent of the “nulls” pulled down nothing but HTML — typical bot behavior.

A single measurement wasn’t enough, so Wendt devised a second based on another marker of bot behavior: politeness.

“Bots can suck down webpages from a server so fast it would shut down the server to anyone else,” he said. “That might prompt the site administrator to block them.”

So bots take turns.

“They say, ‘Hey, give me a page,’ then they may crawl a thousand other sites taking one page from each,” Wendt said. “Or, they might just sit there, spinning their wheels for a second, waiting, and then they’ll say, ‘Hey, give me another page.’”

Some behavior is “bursty”

Browsers go after only one page but instantly want all images, code, and layout files for it.

“I call that a burst,” he said. “A browser is ‘bursty;’ a crawler is not ‘bursty.’”

Bursts equal a certain number of visits within a certain number of seconds. Ninety percent of declared bots had no bursts and none had a high burst ratio. Sixty percent of “nulls” also had no bursts, lending credence to Wendt’s identification of them as bots. However, 40 percent showed some “bursty” behavior, making them hard to separate from browsers. However, normal browser behavior also falls within set parameters. When Wendt combined both metrics, most “nulls” fell outside those parameters, leaving browsers that behaved like bots.

“Now, are all these people lying to me? ‘No.’ There could be reasons somebody would fall into this category and still be a browser,” he said. “But it distinctly increases suspicions.”

He also looked at IP addresses.

IP addresses and user agent strings can collide, but Wendt stated that the odds are dramatically lower that two people will collide on the same IP address and user agent string within a short period. That told him they’re probably different people.

Now, he needs to bridge the gap between splitting groups and identifying targets of ill-intentioned emails. He has submitted proposals to further his research after the current funding ends this spring.

“The problem is significant,” Wendt said. “Humans are one of the best avenues for entering a secure network.”

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities