THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Similar documents
Analytics, Big Data, & Threat Intelligence: How Security is Transforming

RSA Web Threat Detection

CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

RSA Security Analytics

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

The SIEM Evaluator s Guide

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

How To Manage Security On A Networked Computer System

Bridging the gap between COTS tool alerting and raw data analysis

IBM Security X-Force Threat Intelligence

Detect & Investigate Threats. OVERVIEW

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

RSA Security Anatomy of an Attack Lessons learned

Discover & Investigate Advanced Threats. OVERVIEW

10 Things Every Web Application Firewall Should Provide Share this ebook

Rashmi Knowles Chief Security Architect EMEA

Strengthen security with intelligent identity and access management

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

How To Protect Your Online Banking From Fraud

ALERT LOGIC FOR HIPAA COMPLIANCE

Enterprise-Grade Security from the Cloud

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Under the Hood of the IBM Threat Protection System

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

QRadar SIEM and Zscaler Nanolog Streaming Service

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Combating a new generation of cybercriminal with in-depth security monitoring

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Protect Your Business and Customers from Online Fraud

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

RSA Security Analytics Security Analytics System Overview

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

THE EVOLUTION OF SIEM

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

FairWarning Mapping to PCI DSS 3.0, Requirement 10

ACI Response to FFIEC Guidance

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

DETECTING SOPHISTICATED ONLINE ATTACKS WITH STREAMING ANALYTICS

IBM SECURITY QRADAR INCIDENT FORENSICS

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

IBM QRadar Security Intelligence April 2013

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Security Analytics for Smart Grid

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Practical Threat Intelligence. with Bromium LAVA

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

First Line of Defense

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

WHITE PAPER Moving Beyond the FFIEC Guidelines

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Attack Intelligence: Why It Matters

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Win the race against time to stay ahead of cybercriminals

I D C A N A L Y S T C O N N E C T I O N

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Streamlining Web and Security

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CA Arcot RiskFort. Overview. Benefits

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

FISMA / NIST REVISION 3 COMPLIANCE

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

CyberArk Privileged Threat Analytics. Solution Brief

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Breaking down silos of protection: An integrated approach to managing application security

Unified Security, ATP and more

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

QRadar SIEM and FireEye MPS Integration

The Cloud App Visibility Blindspot

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

First Line of Defense

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Find the needle in the security haystack

The Sumo Logic Solution: Security and Compliance

ENABLING FAST RESPONSES THREAT MONITORING

Teradata and Protegrity High-Value Protection for High-Value Data

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Best Practices for Building a Security Operations Center

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Redefining SIEM to Real Time Security Intelligence

Cyber Security Services: Data Loss Prevention Monitoring Overview

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Security Event Management. February 7, 2007 (Revision 5)

Transcription:

THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer.

Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from product awareness through consideration, selection and purchase with various security threats. These include fraud, business logic abuse and other malicious activities. Criminals have evolved to focus their attacks on mobile Web sites and every new mobile application and promotion your marketing department churns out. Bots and other automated malware probe your Web properties long before identifying themselves through the authentication or sign-in process. They can hide as sporadic zero day attacks that appear too infrequently to detect, or are too new to detect by their attack signatures. And your analysts may be drowning in too much data with too little business context from too many monitoring tools to focus on the most serious threats. Online fraud could be costing banks, financial institutions, companies and individuals as much as $200 billion per year 1. In this fast-changing threat environment, yesterday s capabilities don t provide enough protection. Ask these six questions to be sure your Web Threat Detection capabilities can find today s threats. 1. http://www.theguardian.com/technology/2013/oct/30/online-fraud-costs-more-than-100-billion-dollars http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.u58kd_ldwso

1 Can it capture real-time Web session data and stream the data, analytics and threat scores into other Big Data security initiatives? Combining this Web session data with other threat information (such as from point of sale systems or ATMs) creates a more holistic analysis of real-time threats by security analytics systems. Such a capability can help a large Security Operations Center prioritize and focus the thousands of alerts it receives every day from multiple systems. For example, a system correlating data from an external-facing Web site with data from an internal network could more easily identify a fraudster who used SQL injection to gain access to credentials, and used that access to export valuable intellectual property.

2 Does it provide real-time detection and visibility into all Web and mobile traffic, including mobile applications? As organizations develop more appealing Web content and mobile applications, they are increasing their use of the JSON data interchange format. While JSON is a good fit for today s API-driven application development and mobile applications, some observers estimate that nine out of ten mobile applications are vulnerable to attack 2. The ability to visualize the mobile clickstream and parse JSON data can help organizations detect a variety of attacks including Man-in-the-Mobile, Password Guessing, Architecture Probing of the mobile channel, the use of mobile platforms in account compromise and unauthorized account activity. 2. http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.u58kd_ldwso

3 Does it help analysts take action against new anomalous behavior and threat groups that are linked to those encountered before? Web applications, mobile applications and the mechanisms of fraudulent attacks are constantly changing. The actions of clusters of actors or IP addresses that form quickly can signal robotic behavior or DDoS attacks. To find even these sudden attacks as efficiently as possible, analysts must be able to identify, track and score new related groups of threats in real-time based on their suspicious behavior. Can you score groups of users or IP addresses whose behavior departs from baselines such as how fast they navigate the Web site or the number or types of queries they submit? Can these tools quickly compare the members of the new group with known, confirmed lists of user names or IP addresses from which attacks were launched in the past?

4 Can it track and correlate suspicious activity over time across both a population and for each individual profile? A savvy fraudster or automated bot may hit the same Web site across multiple sessions separated by days or weeks. Suspicious behavior outside of the baseline for a population, a user or an IP profile can be indicative of multiple threats. Manually correlating those attacks over time can be impossible or at least prohibitively expensive. Does your Web security solution provide a view of user sessions (by user name or IP address) over time, and allow an analyst to scan multiple sessions over weeks, months or years to more quickly and effectively more quickly and effectively identify and categorize new threats. Can the analyst quickly drill down to examine all the clicks that make up the session to identify threat patterns? Profile Timeline feature

5 Does it highlight the most critical threat information in a summary dashboard for each analyst? Anyone who s scanned a Web security log knows that identifying possible attacks can be an overwhelming task for even an experienced analyst. Does your Web security platform make the job easier with a customizable, high-level dashboard with features such as Top 10 Threat Scores, Top suspicious Server Response Codes or Groups with highest `Man in the Middle footprints grouped on an hourly, daily, weekly or monthly basis? Such dashboard dials could also be set for other suspicious activity such as users with multiple IP addresses or originating from multiple geographies. This speeds time to value by allowing analysts to quickly receive alerts of possible threats, and drill down into the details of the user s activity or the incident to compare it to past activity, or to overall activity within the Web site or the mobile application.

Customized dashboards such as this help overloaded analysts focus on the most critical threats. This Analyst Summary Dashboard in RSA Web Threat Detection 5.0 provides a one-stop-shop for alerts the analyst may decide to investigate further. Among the information provided is the number of alerts for the top 10 threats in the past hour, and signs of possible attacks such as click-through speeds, the use of multiple IP addresses for one user, multiple geographic locations for one user or multiple user agents during the time period.

6Can it track anonymous IP behavior? With underground sites selling user names and passwords by the thousands, more and more bots use scripted attacks to try these credentials against Web sites and mobile applications. That makes it essential to track user sessions before they log in, even if the user is an anonymous IP address. Does your Web site security platform allow you to begin tracking sessions before they are authenticated, looking for attack clues such as numerous, rapid unsuccessful hits on a log-in page? Tracking such pre-authentication behavior also helps detect users whose speedy navigation through a Web site can be a clue to an attack. Unlike a legitimate shopper that browses through different product categories and views multiple styles and reviews, a fraudulent shopper or bot might quickly move to selected product areas, choose large quantities of a valuable item and then quickly log in and charge the purchase to a fraudulent credit card before they are detected. Can your Web site security platform track, and score, groups of anonymous users or sessions or sessions by their speed of interaction with the site?

ABOUT RSA WEB THREAT DETECTION 5.0: RSA Web Threat Detection collects and analyzes massive amounts of real-time data from website traffic to provide web session intelligence and real-time analysis of user behavior. Read how Version 5.0 provides greater insight into the online threat environment, more accurate detection of online threats, and the ability to stream Web intelligence into big-data security initiatives and overall platform enhancements. EMC 2, EMC, the EMC logo, RSA, and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Copyright 2014 EMC Corporation. All rights reserved. H13318