Analysis on Fraud Detection for Internet Service
|
|
|
- Alberta Haynes
- 10 years ago
- Views:
Transcription
1 , pp Analysis on Fraud Detection for Internet Service Tae Kyung Kim 1, Hyung Jin Lim 2 and Jae Hoon Nah 3 1 Dept. Liberal Art, Seoul Theological Univ. 101 Sosabon2-dong, Sosa-gu, Bucheon-City, Kyonggi, Korea 2 Financial Security Agency 143, Uisadang-daero, Youngdeungpo-gu, Seoul, Korea 3 Electronics and Telecommunications Research Institute Gajeong-ro, Yuseong-gu, Daejeon, Korea 1 [email protected], 2 [email protected], 3 [email protected] Abstract In this paper, we proposed the model which can support fraud detection in ICT application service. Fraud detection service monitors and analyzes user activity and behavior at the application level (rather than at the system, database or network level) and watches what transpires inside and across accounts, using any channel available to a user. It also analyzes behavior among related users, accounts or other entities, looking for organized criminal activity, corruption or misuse. This model can be used in e-banking, e-payment, e-government and enterprise remote access, etc. Keywords: Fraud Detection, Monitoring, Measurement 1. Introduction Online banking and e-commerce have been experiencing rapid growth over the past few years and show tremendous promise of growth even in the future [1]. Many fraudsters and malicious users are able to commit their crimes by opening new online accounts at unsuspecting enterprises by illegitimately taking over customer accounts and posing as those customers, or by conducting high-risk (e.g., involving high-monetary-value or highly sensitive information) transactions using stolen payment account information[2]. By accessing and using relatively basic information, a criminal can take over existing financial accounts (existing card fraud or existing non-card fraud) or use a victim s personal information to create new accounts (new account fraud). A criminal can commit identity fraud numerous ways, including making an unauthorized withdrawal of funds from an account or making fraudulent purchases with a credit card and creating new accounts (e.g., banking, telephone, utility, loans). Aside from e-financial service, malware-based attacks have been responsible for targeted attacks in many types of companies and vertical industries. They are becoming a major concern and are increasingly delivered through targeted spear-phishing s and through malware-infected objects like advertisements that unknowing users click on. For example, these methods were used to infect multiple organizations. Organizations in many commercial and government sectors face significant risks of data loss, inappropriate account access, and inappropriate transaction activity from external and internal sources. Targeted malware can often bypass existing protection technologies, and the resulting data breaches are not detected until a long time has passed and significant data exfiltration has occurred. The evidence of malicious activity is usually hiding in plain sight, ISSN: IJSIA Copyright c 2013 SERSC
2 and is undetected because of a lack of monitoring capability and an inability to discern a pattern of abnormal application activity or data access from normal activity patterns. Also, in case of bank customer may not even know that a fraud has been committed until users see an account that you did not open on user s credit report, or until a debt collector contacts you for payment[3]. Malware-based attacks against bank customers and company employees are levying severe reputational and financial damage on their victims. They are fast becoming a prevalent tool for attacking customer and corporate accounts, and stealing sensitive information or funds. Therefore, unless it makes business processes and organization are properly structured to effectively manage fraud detection systems, important alarms and alerts could be ignored. Finally, it can be used to take over user accounts, or to perpetrate fraud or theft of serverbased assets. In Chapter 2 measurement architecture for fraud detection is described. Monitoring architecture, detection architecture and response architecture are showed in Chapter 3,4 and 5. Finally, Chapter 6 concludes this paper. 2. Measurement architecture for fraud detection When it comes to comprehensively counteract identity fraud, it fraud prevention required requires to a three-part approach to addressing this problem: prevention monitoring, detection and incident response. These measures include steps to take in order to prevent find suspicious activity fraud from happened various event data in the first place; actions to detect frauds earlier in the event that it happens; and what to do to resolve fraud if suspicious activities were detected user become a victim Monitoring It can monitor fraud by looking for anomalies in user activity and behavior at the application level, as well as the system, database or network level, and watches what transpires inside and across accounts using any channel available to a user. It also monitors and analyzes user or account behavior and associated transactions and identifies anomalous behavior, using rules or statistical models. It may also use continuously updated profiles of users and accounts, as well as peer groups for comparing transactions and identifying the suspect ones Detection It also requires the detection capability to mine, dissect and analyze large volumes of data using complex relationship and rule screening, defined by the business, to prevent fraud[4]. It can be used for insider fraud detection and external fraud detection. For fraud detection capability support, it can and should profile various entities, such as users, accounts, households, PCs, mobile handsets and kiosks, to spot abnormal transaction behavior from that entity. Fraud detection uses rule-based policies that are based on human judgment and knowledge and/or predictive mathematical models to score the likelihood of fraud for a given transaction Response After incidents have occurred, it must make various precaution activities and response of suspicious activities and incident alerts. A variety of complementary monitoring and detection 276 Copyright c 2013 SERSC
3 technologies can help enterprises better detect suspicious user activity; recognize patterns of inappropriate resource access or fraudulent account activity Architecture considerations Implementing fraud detection system for ICT applications can be considered using one of three architectures: Fraud-detection modules built into the application server (e.g. Web), Listening and/or monitoring of the online application, and Programmatic interfaces into the legacy application. Business rules and processes are more important determinants of an application s effectiveness. A fraud-detection module sitting inside the application server Rules maintained by the enterprise are applied by the filter to any HTTP request (for example, login or payment) before the transaction hits the application. Transactions can be stopped and/or redirected to a transaction-verification routine in real time through execution of the module s fraud rules. Several vendors provide plug-ins to application servers is directly embedded with a preprocessor. Listening and/or monitoring of the ICT application (listening mode) In this mode, the application listens to or "sniffs" input files or HTTP network traffic (for example, log), or reads data using application server plug-ins installed at each server. Data is read in real-time (network "sniffer" approach) or near real (application server listener approach) and either fed to another fraud-management application or reconstructed into a format on which fraud rules can be applied. In the latter case, suspect transactions are queued for fraud analyst follow up. Customized application programming interfaces (APIs) can be integrated so that transactions are redirected to challenge/response verification. Programmatic interfaces into the legacy application (inline integration mode) In this case, APIs are used to pass all transactions through fraud detection before a transaction is processed. Transaction flow is controlled, so a user can be challenged in real time if a suspect transaction is detected. Changes in business rules require changes to the core application. APIs are mainly based on Web services. APIs also make it harder to switch vendor specific solutions. Generally, using APIs for fraud detection gives enterprises/organization direct control over transaction flow, but requires significant integration work, and must be constantly updated when the core application changes. Application servers which require not intervening real time in user transactions will prefer the second approach, which is the easiest to pull out and replace. 3. Monitoring architecture Monitoring capability establishes user and data context is needed for early attack and breach detection, and enables data access and activity monitoring. Privileged user and sensitive data access monitoring is also a common requirement for compliance reporting. It needs to implement security information and event management to gain broadscope monitoring of user activity and resource access across the network, systems, databases and applications, and augment event data with context about users, assets, Copyright c 2013 SERSC 277
4 threats and vulnerabilities to improve the effectiveness of security monitoring for breach detection. Also, It needs to selectively augment general security monitoring with additional capabilities such as advanced threat monitoring, based on the level of risk and capability to implement and effectively operate the fraud detection and response system. Fraud detection system also collects event data in near real time in a way that enables immediate analysis. Real-time monitoring capability is important for threat management to track and analyze the progression of an attack across components and systems and for user activity monitoring to track and analyze the activity of a user across applications, or to track and analyze a series of related transactions or data access events. Also, real-time monitoring capability should support batch data collection for cases where real-time collection is not practical or is not needed. Figure 1. Monitoring Capabilities of Fraud Detection System 3.1. Data aggregation and collection Data aggregation and collection are supported for a wide variety of log data sources, including network and security devices; server, database and application logs; the output of security-relevant applications, such as vulnerability assessment and database activity monitors; and the output of relevant identity and access management technologies, such as enterprise directories, user provisioning and access management systems. Non-Real time monitoring It requires manual or automated reviewing of log files. Non-real time monitoring may provide rapid deployment option for post-transaction analysis with longer clearance periods and can remove ability to stop transactions at point of completion. It should support batch data collection for cases where real-time collection is not practical or is not needed. Real time monitoring It is to monitor all transactions (e.g., http) in real time using a web server filter. This function could monitor without additional hardware using a low impact web server filter. It s possible to implement no application changes required to see any real-time transaction data. Real Time online monitoring external to application function: It is to monitor all HTTP web transactions in real time via internal application integration. This function could consume cost 278 Copyright c 2013 SERSC
5 and time intensive to deploy and maintain because it needs extensive application modification to monitor specific transaction points. Real time online monitoring external to application It is to monitor all HTTP Web transactions in real time via external application. This function has no impact to application for sniffer and Web filter approach but application filter is inline to application, which may introduce risk to application reliability. It s possible to implement no application changes required to see any real-time transaction data. Multi-channel data aggregation This means that transaction data from other channels can be fully incorporated in the monitoring and fraud detection process. It also looks for suspect user or account behavior, but it also offers the benefit of looking across channels and products and correlating alerts and activities for each user, account or entity. It enables the analysis of relationships among internal and/or external entities and their attributes (for example, users, accounts, account attributes, machines and machine attributes) to detect organized or collusive criminal activities or misuse Data source Fraud detection system can detect malicious activity in a constant stream of discrete events that are usually associated with an authorized user and are generated from multiple network, system and application sources. Monitoring capabilities include integration with multiple sources to obtain suspicious and incident events. Data and content monitoring The capabilities are often used to limit information leaks, such as credit card numbers, personally identifiable information, and document- or database-based intellectual property, including function through content monitoring function and filtering and data loss prevention (DLP) function. Content monitoring and filtering are used to protect content in motion (through network monitoring or filtering), at rest (via storage scanning) and in use (through endpoint agents). Most functions also include capabilities to scan stored content on the network for policy violations (for example, a credit card number on an unapproved server), finding violations of corporate policies around the appropriate use of content and data. DLP tools can discover, monitor and actively block the movement or access to sensitive data by using content inspection and contextual analysis techniques to apply one or more policies at the time of use. DLP is limited by an organization's ability to define sensitive content, its structures or other identifying characteristics. Although these functions are extremely useful in limiting accidental exposure or those caused by bad business processes, there are many non-monitored activities that can be used by a malicious attacker or insider (such as camera phones, voice mail, paper and pen) to circumvent content-aware solutions. Application and transaction monitoring Monitoring capability includes application monitoring because application weaknesses are frequently exploited in targeted attacks, and abnormal application activity may be the only signal of a successful breach or of fraudulent activity. The ability to parse activity streams from packaged applications enables application-layer monitoring for those components, and Copyright c 2013 SERSC 279
6 the ability to define and parse activity streams for custom applications enables applicationlayer monitoring for in-house developed applications. The capability also watches for suspect user activity in an application within a given access channel (for example, Web, phone or in-person, or across applications, access channels) or even organizations such as where "black lists" of bad IP addresses are shared across organizations. This can range from detecting abnormal access (for example, simultaneous access by one device from two disparate geographic locations) to a suspect transaction sequence (for example, a change in address followed by a high-value money transfer). By default, it can also spot unauthorized employee activities if done in an application that is monitored by the fraud detection application. Network behavior monitoring The capability provides visibility into network operations based on traffic flows between systems, including source, destination, port, protocol, volume of data exchanged and user identity. The capability has applicability for security- and operations-related analysis. Also, the capability uses a combination of signature and anomaly detection to provide visibility into the state of the network and to identify deviations from baselines, which may indicate abnormal or suspicious behavior. Security use cases include monitoring to detect the spread of worms, the unauthorized installation of applications and suspicious system access activity. Operation use cases include capacity planning and traffic analysis, including the capability to bind a user ID to traffic flow, or to address auditor requirements to track user access to critical systems. The capability has little visibility beyond Layer 3, so it can't directly detect system, database, content, file system or other object access issues. 4. Detection architecture Fraud detection uses background server-based processes transparent to users that examine user access and behavior. It then compares this information to a profile of what's expected and considered "normal." It simultaneously evaluates a combination of risk factors to surface real fraud and keep false detection rates low. Suspect user transactions are re-verified in real time to assess their legitimacy or are suspended until fraud analysts have time to research their legitimacy. Since fraud detection operates in the context of an application, it cannot detect rogue and potentially fraudulent processes that are external to the application. Fraud detection also cannot detect suspect behavior that is not defined to its engine because the rules are not aware of the activity pattern, the model has not learned enough to single it out or the application integration is not providing enough relevant data to the fraud risk assessment engine. To be effective detection, the analysis requires embedded knowledge for specific use cases, or the customer needs to provide this knowledge in the form of customized correlation rules and reports. Therefore, fraud detection system needs capabilities such as fraud pattern update, pre-defined rule library support, and real time rule processing. Most capabilities require extensive model tuning, profile tuning or rule development before the applications are fully functional. These capabilities include monitoring all transactions, automated risk analysis and risk rating, user behavior profiling and learning, application service specific- and intelligent-fraud decision, cross-channel risk assessment. 280 Copyright c 2013 SERSC
7 Figure 2. Detection Capabilities of Fraud Detection System 5. Response architecture Fraud detection system requires automotive triggering fraud alerts, account block, stepped-up applicant verification of a particular transaction that has been tagged as suspect for incident response. All online account applications or high-risk anonymous transactions should go through a set of initial screening procedures, starting with authentication events as the result of the initial identity-proofing procedure to the application usage and application logs. The initial screening procedure includes basic fraud detection, such as client device identification and verification of basic identity data, such as name, address, geo-location analysis, telephone number validation, credit card fraud detection, credit bureau report validation and/or identity scoring. The suspect transactions that don't pass the initial identity-proofing steps, should be routed to a fraud investigation team, and queued for manual or automated additional screening. Then, fraud detection system can use a risk-based and layered identityproofing approach that steps up the identity vetting if suspect users and high-risk transactions are prompted, for additional screening. Copyright c 2013 SERSC 281
8 Risk-based authentication The higher the risk, as determined, for example, by a fraud detection system, the more costly and inconvenient to the customer the identity-proofing measures are required. Several approaches are available when more authentications are needed. Fraud alerts Fraud alert is typically the result of a combination of a risk score and some rules that act on that score. Detailed alerts include transaction attributes and activity description and could be notified via , pager configurable by rule, severity, admin user. Fraud alerts could be sent to security expert or customer/user according to measured risk level. Then, the security expert could investigate the perceived risk in more detail, while fraud alert to the customer/user can use to alert potential lenders that their identity may have been stolen. Account block Account block is applied to user accounts when suspicious activity detected. The user can be approved or denied access based on the assigned score and the institution's tolerance limits. Users who do not score adequately to warrant full access can be allowed limited access or be required to provide more authentications to gain full access or be permitted to perform certain high-risk transactions. In case of not satisfied, the user can re-started stepped verification procedure or blocked promptly. Information sharing Fraud detection system should ensure that they effectively coordinate portions of their incident response activities with appropriate partners of organization. Information sharing can take place directly between enterprise and customers or between organization and employee because the same threats and attacks often affect multiple organizations or services simultaneously. The most important aspect of incident response coordination is information sharing, where different organizations share threat, attack, and vulnerability information with each other so that each organization s knowledge benefits the other. The purpose of information sharing is 282 Copyright c 2013 SERSC
9 to enable any organization that has detected fraud to share this information, either internally or with other potential victim organizations. 6. Conclusions Recently many fraud detection techniques involving sophisticated screening of transactions to tracking customer behavior and spending patterns are being deployed by both banks as well as merchant companies. Some of the techniques include Address Verification Systems (AVS), Card Verification Method (CVS), Personal Identification Number (PIN), Rule-based systems and Biometrics. Effective internet fraud detection applies controls at the front end, through stronger authentication, and at the back end, through cross-industry, multichannel behavior-pattern recognition. This requires participation and data sharing across industries and service providers, and will be the primary challenge for successful implementations. There is currently no standard for fraud detection system. Therefore, we suggested the fraud detection model. This model can be helpful to protect fraud activities in internet environments. Acknowledgements This research was supported by the ICT Standardization program of MISP(The Ministry of Science, ICT & Future Planning). References [1] J. T. S. Quah and M. Sriganesh, Real Time Credit Card Fraud Detection using Computational Intelligence, Expert Systems with Applications, vol. 35, no. 4, (2008) November. [2] B. Zhang, Y. Zhou, C. Faloutsos, "Toward a Comprehensive Model in Internet Auction Fraud Detection", Proceedings of the 41st Hawaii International Conference on System Sciences, (2008). [3] L. Delamaire, H. Abdou and J. Pointon, Credit card fraud and detection techniques: a review, Banks and Bank Systems, vol. 4, no. 2, (2009). [4] K. B. Bignell, Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection, International Conference on Internet Surveillance and Protection, (2006). Authors Tae Kyung Kim 1997 : Dankook University, Korea (BS in mathematics education) 2001 : Sungkyunkwan University, Korea (MS in Computer Science) 2005 : Sungkyunkwan University, Korea (PhD in Computer Science) Present : Seoul Theological University, Korea (Professor) Research interests: Network Security, Network QoS, Cloud Computing, and COP Hyung-Jin Lim 1998 : Hallym University, Korea (BS in Computer Engineering) 2001 : Sungkyunkwan University, Korea (MS in Computer Science) 2006 : Sungkyunkwan University, Korea (PhD in Computer Science) Present : Financial Security Agency, Korea (Senior Researcher) Research interests : ID management, Multi-factor Authentication and financial information security Copyright c 2013 SERSC 283
10 Jae Hoon Nah 985 : Chung-Ang University, Korea (BS in Computer Science) 1987 : Chung-Ang University, Korea (MS in Computer Science) 2005 : HANKUK University of Foreign Studies, Korea (PhD in Computer Science) Present : Electronics and Telecommunications Research Institute, Korea (Senior Researcher) Research interests: IPv6/MIPv6, P2P, IPTV, and Mashup Web Security 284 Copyright c 2013 SERSC
SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1157 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Closing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Transaction Anomaly Protection Stopping Malware At The Door. White Paper
Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
Best Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage. CERT Insider Threat Center
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage CERT Insider Threat Center April 2011 NOTICE: THIS TECHNICAL DATA IS PROVIDED PURSUANT TO GOVERNMENT CONTRACT
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible
White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
