#splunkconf. Analyzing & Mitigating Malicious Web Activity using Splunk Enterprise
|
|
|
- Georgiana Simon
- 9 years ago
- Views:
Transcription
1 #splunkconf Analyzing & Mitigating Malicious Web Activity using Splunk Enterprise
2 StubHub The World s Largest Fan-to-Fan Marketplace At StubHub, our mission is simple: provide fans a safe, convenient place to get tickets to the games, concerts, and theater shows they want to see, and an easy way to sell their tickets when they can't go. Confidential Slide 2
3 Brief Intro Who am I? Joined StubHub 2007 as part of application support team In 2011 moved to lead for Tools & Automation team Bit of a Splunk nerd [email protected] Confidential Slide 3
4 Agenda There is a constant stream of malicious web hits, poorly written scripts, and overly aggressive web crawlers. By collecting all web access logs into Splunk, you have the power to catalog and trend this activity in real time Confidential Slide 4
5 Why Attack StubHub? Why not? Tickets are very liquid cash! Confidential Slide 5
6 What Are Web Access Logs? Web access logs are the data points generated by a web server when you visit the content that it serves These logs establish a historical record of visitor activity Traffic patterns can be established and analyzed from this data Confidential Slide 6
7 Common Attacks Usual suspects Sql injection Trolling for admin pages Malformed parameters & parameter walking Scripts Shady: scripts that interact with web forms Abusive: scraping data Fraud Confidential Slide 7
8 What Can We Learn From Web Access Logs? [11/Jul/2013:12:19: ] "GET /admin/default. \"Xx<XaXaXXaXaX>xX/ HTTP/1.1" "-" "Mozilla/5.0 (compatible; MSIE 7.0; MSIE 6.0; ScanAlert; + Firefox/ " IP address lets us know who made a request: The other half of who is the user agent: Mozilla/ ScanAlert What was requested?: GET /admin/default.\ Xx<XaXaSSaXaX>xX/ We also know the where, as Splunk is aware of the endpoints that generated the logs Confidential Slide 8
9 What IP is Hogging Resources? 1. Write a search to find your access logs index=web 2. Identify the ten most frequent values of the field ip address top ipaddress 3. View the chart created! 4. Wait... Those are internal addresses Confidential Slide 9
10 What IP is Hogging Resources? Add filters to the base search: ipaddress!=10.* Index=web ipaddress!=10.* OR ipaddress!=xxx top ipaddress Confidential Slide 10
11 When Did This Start? Use timechart count by ipaddress instead of top Confidential Slide 11
12 We Need Metadata! Location geoip ipaddress Who owns the IP? lookup whois ipaddress What does the IP resolve to? Is it a threat? nslookup ipaddress Project Honeypot: lookup threatscore ipaddress On the internal whitelist/blacklist?: lookup ip_whitelist ipaddress Confidential Slide 12
13 Search Result With Metadata Geographically by City & Country IP Address owner Project Honeypot Project Honeypot is a log based score!!! Confidential Slide 13
14 What Can We Do with User Agent? Scenario: Load is spiked on all servers Hundreds of IP addresses are hitting hard and fast at multiple endpoints No pattern to who owns the IP address top ipaddress is wildly askew Hmmm, that looks funny in Splunk Confidential Slide 14
15 Not a DDoS web crawler Gone Wild Confidential Slide 15
16 We Can Identify Who What Else Can We Do? Let s Review Data Available From Logs themselves Metadata Who: IP Address & User Agent IP owner What: Request string & GET/POST IP DNS name (if available) Where: URL IP Geographical location Reputation scores SANS Project Honeypot Internal Whitelist/blacklist Confidential Slide 16
17 Time to Analyze the Request Itself Malicious requests <website url>/yankees-tickets/../../../../etc/passwd /administrators/index.php (StubHub is not a PHP shop ) /;DROP High frequency requests Hits are <1 second apart Malformed requests Might be made to avoid caching by CDN Confidential Slide 17
18 Malicious Request StubHub does not have a valid join_form.php URL Requests came in seconds apart IP originates from China Confidential Slide 18
19 Eventtypes for Known Bad Requests! Eventtypes in Splunk are a way to categorize data in Splunk Naming convention + wildcard = WIN! Search: index=web web_threat* To add another type of bad request, we simply add another eventtype Alerts & dashboards that use the search above will automatically begin using it Web_threat_php url=*.php* Web_threat_aspx url=*.aspx* Web_threat_admin url=*admin* Web_threat_passwd url=*/etc/passw* Web_threat_jmx url=*/jmx/* OR url=*/jmx-console/* Confidential Slide 19
20 Malicious Requests Creating a Smart Search index=web web_threat* stats count dc(eventtype) as attackcount by ipaddress,useragent! Returns count of bad web hits by unique IP address & useragent combinations, as well as a count of distinct types of bad requests made eval threatscore=attackcount! Creates numerical score driven by the unique type of attacks lookup (geo honeypot whois etc) (syntax is not correct here) Add metadata eval threatscore=if(match(country, USA Canada UK ),threatscore,threatscore*2)! Skew the score against countries that StubHub does NOT have a presence in eval threatscore=if(match(useragent, linux wget curl - ) OR isnull(useragent),threatscore*2,threatscore! Skew the score against known interesting user agents, or missing user agents as these are signs that this is a bad actor Confidential Slide 20
21 Malicious Requests Creating a Smart Search eval threatscore=if(match(method, POST ) AND match(status, 200 ),threatscore*5,threatscore)! where threatscore>5! Eliminate low scoring IP addresses sort threatscore! Sorts from highest score to the lowest index=apache web_threat* stats count dc(eventtype) as attackcount by ipaddress,useragent eval threatscore=attackcount lookup (geo honeypot whois etc) eval threatscore=if(match(country, USA Canada UK ),threatscore,threatscore*2) eval threatscore=if(match(useragent, linux wget curl ) OR isnull(useragent),threatscore*2,threatscore eval threatscore=if(match(method, POST ) AND match(status, 200 ),threatscore*5,threatscore) where threatscore>5 sort threatscore! Confidential Slide 21
22 Malicious Requests Creating a Smart Search This can be run from a dashboard in Splunk, or as an alert The alert can be set to record the results into a summary index result: Confidential Slide 22
23 Interesting Stats from the Database of Maliciousness Geographically by City & Country IP Distribution -1 week IP Distribution Geographic Distribution >4500 bad requests >28,000 bad requests Project Honeypot score is 37 From Russian Federation No Honeypot score From Israel Confidential Slide 23
24 Identify Your Visitors Confidential Slide 24
25 User ID in the Web Access Logs With identifying information present, you can apply all the existing alerts/ dashboards/queries, but enrich with far more intelligence. Form parameters, cookie values, unique URL s, etc are some methods that could be used to accomplish this. Confidential Slide 25
26 Analyze User Behavior stats count dc(unique identifier) as usercount Confidential Slide 26
27 Detect Brute Force Attacks If I want to detect this activity, what do I do? Splunk search! index=web stats dc(unique identifier) as uniquecount by ipaddress,useragent sort uniquecount! Hmm, that s a lot of data how do I filter the search results? Hard limit? Attacker will find limit and attack until limit-1 Let s use statistics See Splunk Blog for inspiration 27 Confidential Slide 27
28 Detect Brute Force Base search: index=web Statistics: stats dc(unique identifier) as usercount by ipaddress,useragent! Calculate average number of users touched by all IP/user agent combinations: eventstats avg(usercount) as avg stdevp(usercount) as stdev! Add Metadata Confidential Slide 28
29 Detect Brute Force A z score (number of standard deviations from mean) of +4 is above the 99 th percentile; let s pick an incredibly high z score as a limit where usercount>avg+(stdev*20)! USAF is account peeking? (Hi NSA!) Organizations with tightly controlled computers & single exit points to the internet show up frequently Used Splunk to compress 5,000:1, with a granularity of 1 day so we can do long term reporting in <5 minutes. Confidential Slide 29
30 Corporate IT Upgrade Art Confidential Slide 30
31 Brute Force by IP Owner Confidential Slide 31
32 65% of Traffic to an Application Pool! Confidential Slide 32
33 Swing the Ban Hammer! Confidential Slide 33
34 Splunk Doesn t Sleep Confidential Slide 34
35 Low & Slow, or Hard & Fast? Confidential Slide 35
36 Anatomy of an Attack Confidential Slide 36
37 Mitigation Manual Mitigation Automatic Block the IP or range Report to your risk/fraud/etc teams to Block the user agent review users Captcha Etc. Automate the steps to the left with a script Confidential Slide 37
38 Next Steps 1 Download the.conf2013 Mobile App If not iphone, ipad or Android, use the Web App 2 3 Take the survey & WIN A PASS FOR.CONF2014 Or one of these bags! Go to Securing Splunk for the Enterprise How to keep Accreditors Away from Splunk Mont-Royal 1, Level 4 Today, 10:15-11:15pm 38 Confidential Slide 38
Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?
Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats? Will Froning, Information Security Manager, American University of Sharjah Mark Seward, Senior Director, Security and Compliance
Analytics, Big Data, & Threat Intelligence: How Security is Transforming
Analytics, Big Data, & Threat Intelligence: How Security is Transforming Jason Sloderbeck Director, Product Management RSA Web Threat Detection 1 Presentation Overview The Largest Threat How Can Big Data
More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data
Copyright 2013 Splunk Inc. More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data Allan, Mike, Rahul, Sondra #splunkconf About Us! Allan Tomkinson Senior Developer @Lincoln Financial
Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.
Repsheet A Behavior Based Approach to Web Application Security Aaron Bedra Application Security Lead Braintree Payments Right now, your web applications are being attacked And it will happen again, and
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
Redefining SIEM to Real Time Security Intelligence
Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience
Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience 黃 振 修 (Chris Huang) SPN 主 動 式 雲 端 截 毒 技 術 架 構 師 About Me SPN 主 動 式 雲 端 截 毒 技 術 架 構 師 SPN Hadoop 基 礎 運 算 架 構 師 Hadoop in Taiwan
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
RSA Web Threat Detection
RSA Web Threat Detection Online Threat Detection in Real Time Matthew Joseff, Sr. Technology Evangelist, RSA 2 RSA Web Threat Detection Online Threat Detection in Real Time Matthew Joseff, Sr. Technology
Web Application Vulnerability Scanner: Skipfish
Web Application Vulnerability Scanner: Skipfish Page 1 of 7 EXECUTIVE SUMMARY Skipfish is an automated web application vulnerability scanner available for free download at Google s code website. It is
What Is Ad-Aware Update Server?
Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
Akamai Security Products
Akamai Security Products Key Areas of Cloud Security for Akamai Protect Web Availability Internet Infrastructure Security Remove Credit Cards Payment Tokenization Web Application Firewall Application Security
Basheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES
.com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Application Security Manager ASM. David Perodin F5 Engineer
Application Security Manager ASM David Perodin F5 Engineer 3 Overview BIG-IP Application Security Manager (ASM) a type of Web application firewall ASM s advanced application visibility, reporting and analytics
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks
Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection Oğuz YILMAZ CTO Labris Networks 1 Today Labris Networks L7 Attacks L7 HTTP DDoS Detection Problems Case Study: Deep DDOS Inspection (DDI
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
Learn How to Defend Your Online Marketplace from Unwanted Traffic
Learn How to Defend Your Online Marketplace from Unwanted Traffic Speakers Rami Essaid CEO & Co-founder Distil in Classifieds The Basics of Bots A Bot is an automated program that runs on the internet
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
www.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Understanding the Digital Audience
Understanding the Digital Audience How Splunk Software is Used to Find the Needle and See the Whole Haystack CUSTOMER profile Splunk customer profiles are a collection of innovative, in-depth use cases
Additional information >>> HERE <<< Free Download buy website traffic. Click Here => http://urlzz.org/ptrman/pdx/fph1
Additional information >>> HERE
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Sitecore Health. Christopher Wojciech. netzkern AG. [email protected]. Sitecore User Group Conference 2015
Sitecore Health Christopher Wojciech netzkern AG [email protected] Sitecore User Group Conference 2015 1 Hi, % Increase in Page Abondonment 40% 30% 20% 10% 0% 2 sec to 4 2 sec to 6 2 sec
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
Leveraging Machine Data to Deliver New Insights for Business Analytics
Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
White Paper. Intelligence Driven. Security Monitoring. v.2.1.1. nexusguard.com
White Paper 1 Intelligence Driven Security Monitoring v.2.1.1 Overview In today s hypercompetitive business environment, companies have to make swift and decisive decisions. Making the right judgment call
COMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
Security Intelligenece: tracking obfuscated and unrecognized attacks. 2014 Check Point Software Technologies Ltd.
Security Intelligenece: tracking obfuscated and unrecognized attacks 2014 Check Point Software Technologies Ltd. Security Policy Rule Types: 1 Access People, Applications, Services, Servers, Data 2 Threat
Mobile app for ios Version 1.10.x, August 2014
Mobile app for ios Version 1.10.x, August 2014 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime. Managers,
Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution
Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution Today s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers
Akamai to Incapsula Migration Guide
Guide Akamai to Incapsula Migration Guide Introduction Incapsula is an enterprise-grade cloud service that helps companies deliver applications more efficiently and securely. This is accomplished through
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity
Threat Intelligence for Dummies Karen Scarfone Scarfone Cybersecurity 1 Source Material Threat Intelligence for Dummies ebook Co-authored with Steve Piper of CyberEdge Group Published by Wiley Sponsored
Powered by. Incapsula Cloud WAF
Powered by Incapsula Cloud WAF Enero - 2013 Incapsula Cloud WAF Overview Incapsula Cloud WAF Delivery Model Threat Central 360 Global Threat Detection & Analysis Enables early detection across the entire
Splunk Enterprise in the Cloud Vision and Roadmap
Copyright 2013 Splunk Inc. Splunk Enterprise in the Cloud Vision and Roadmap Alex Munk PM Cloud #splunkconf Ledio Ago Director of Engineering Cloud Legal NoJces During the course of this presentajon, we
Application for Splunk Enterprise
Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered
A Network Administrator s Guide to Web App Security
A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and
Rashmi Knowles Chief Security Architect EMEA
Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE
In the Trenches of a Globally Spanning SIP Network
In the Trenches of a Globally Spanning SIP Network & the days spent firefighting AGENDA - Our SIP Network at a glance - Loops - Failover strategies - Connection Management - Registration - Misc INTRO
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
SE Ranking www.intellectsoft.co.uk Report
SE Ranking www.intellectsoft.co.uk Report Jul-31, 2015 - Aug-06, 2015 Intellectsoft UK http://www.intellectsoft.co.uk/ Aug-06, 2015 2/22 Intellectsoft UK (www.intellectsoft.co.uk) Report summary... 3 Rankings
From the Datacenter to the Dean s office
Copyright 2013 Splunk Inc. From the Datacenter to the Dean s office Mark Runals Sr Security Engineer, The Ohio State University #splunkconf About Me! Started at OSU July 12 = 14 months using Splunk! Splunk
Metric Matters. Dain Perkins, CISSP [email protected]
Metric Matters Dain Perkins, CISSP [email protected] My Perspective Information security metrics do not show us how we need to improve our defenses Image: http://abcnews.go.com/sports/2014-fifa-world-cup-us-goalie-tim-howard/story?id=24400295
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
WompMobile Technical FAQ
WompMobile Technical FAQ What are the technical benefits of WompMobile? The mobile site has the same exact URL as the desktop website. The mobile site automatically and instantly syncs with the desktop
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box
Penetration Testing Penetration Testing Types Black Box oless productive, more difficult White Box oopen, team supported, typically internal osource available Gray Box (Grey Box) omixture of the two Methods
SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer
SECURE THE DATACENTER Dennis de Leest Sr. Systems Engineer PURE PLAY IN HIGH-PERFORMANCE NETWORKING Breadth First 10 Years of Today s Of Juniper: Portfolio 1996-2006 Core Edge Access & Data Center WAN
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Defending against Cyber Attacks
2015 AMC Privacy & Security Conference Defending against Cyber Attacks MICHAEL DOCKERY CHRIS BEAL PAUL HOWELL Security & Privacy Track June 24, 2015 In the News 2015 MCNC General Use v1.0 Healthcare Data
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE Jason Sloderbeck Silver Tail Systems, Part of RSA Session ID: SPO1-W22 Session Classification: General Track Question Do
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Guide to AWS. Brought to you by
Guide to AWS Brought to you by Welcome to Ingram Micro Cloud For more than 35 years, Ingram Micro a Fortune 100 company with $30 billion in annual revenue has been successfully connecting IT technology
Mobile app for ios Version 1.11.x, December 2015
Mobile app for ios Version 1.11.x, December 2015 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime.
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
API Documentation. Introduction. General request structure. Authentication. Account and Site Identifiers. Name Description Optional
API Documentation Introduction Incapsula provides customers and partners with the ability to manage accounts and sites via an API. The API has the following characteristics: Requests are HTTP POST Parameters
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
Common Criteria Web Application Security Scoring CCWAPSS
Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. [email protected] Releases Version 1.0 : First public release September 2007 Version
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration
NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0
User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,
How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments
Copyright 2013 Splunk Inc. How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments Enoch Long Prin Sec Strategist/Client Architect, Splunk(Fed) #splunkconf Legal NoNces
WHITE PAPER WORK PROCESS AND TECHNOLOGIES FOR MAGENTO PERFORMANCE (BASED ON FLIGHT CLUB) June, 2014. Project Background
WHITE PAPER WORK PROCESS AND TECHNOLOGIES FOR MAGENTO PERFORMANCE (BASED ON FLIGHT CLUB) June, 2014 Project Background Flight Club is the world s leading sneaker marketplace specialising in storing, shipping,
SANS Dshield Webhoneypot Project. OWASP November 13th, 2009. The OWASP Foundation http://www.owasp.org. Jason Lam
SANS Dshield Webhoneypot Project Jason Lam November 13th, 2009 SANS Internet Storm Center [email protected] The Foundation http://www.owasp.org Introduction Who is Jason Lam Agenda Intro to honeypot
A Love Affair: Cyber Security, Big-data and Risk
A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots
Web Security Threat Report: January April 2007 Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots What are we reporting? We are presenting real, live web attack data captured in-the-wild.
