Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis

Similar documents
Introduction to Forensics 101. Joseph A. Juchniewicz Security Analyst AmeriCredit

Social Media Monitoring in Fifteen Minutes

2015 State of Artificial Intelligence & Big Data in the Enterprise

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

Beyond listening Driving better decisions with business intelligence from social sources

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Competitive intelligence: History, importance, objectives, process and issues

Cyber Intelligence Workforce

Espionage and Intelligence. Debra A. Miller, Book Editor

WRITTEN TESTIMONY OF

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

FBI CHALLENGES IN A CYBER-BASED WORLD

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Developing Cyber Threat Intelligence or not failing in battle.

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

How To Use Social Media To Improve Your Business

Federal Bureau of Investigation

Using the Internet to Raise Funds and Mobilize Supporters: Lessons Nonprofits Can Learn from the Dean for America Presidential Campaign.

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Foundations of Computer Security

Barack Obama won the battle on social media too!

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Data Science and Business Analytics Certificate Data Science and Business Intelligence Certificate

The Big Data Paradigm Shift. Insight Through Automation

LEAD NURTURING. Master s Series Lead Nurturing Basics. Marketing Qualified. Engaged. Sales Accepted. Sales Qualified. Anonymous. Closed. Lead.

WHITE PAPER. Creating your Intranet Checklist

SALES & MARKETING. Solution Guide for the Social Enterprise

Mortgage Secrets. What the banks don t want you to know.

WHAT YOU NEED TO KNOW, AND WHY OUR COMPETITORS DON T LIKE US

Churn Rate 101 ANALYTICS BASICS. What is churn? How does it affect your business? How do you measure it?

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

HOW TO ACCURATELY TRACK YOUR SOCIAL MEDIA BUZZ

Analytics Scheduling reports

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management

Chapter 6 - Enhancing Business Intelligence Using Information Systems

Turn a first impression into a client

In this presentation, you will be introduced to data mining and the relationship with meaningful use.

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

The Bibliomining Process: Data Warehousing and Data Mining for Library Decision-Making

Why You Need to Test All Your Cloud, Mobile and Web Applications

After the Attack. The Transformation of EMC Security Operations

A Primer on Cyber Threat Intelligence

What is Data Science? Data, Databases, and the Extraction of Knowledge Renée November 2014

Big Data and Security: At the Edge of Prediction

CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization

HOW TO GET. 1,000+ Followers ON TWITTER

Social Media Measuring Your Efforts 03. Step One Align Your Objectives 04. Step Two Measure Reach and Share of Conversation 05

Keyword Research: Exactly what cash buyers, motivated sellers, and private lenders are looking for online. (and how to get in front of them)

INFRAGARD.ORG. Portland FBI. Unclassified 1

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Malware in the clouds. Building the Undetectable Bot

Travel agents guide to SMS messaging. How to use SMS messaging for marketing, booking, and customer support

Management Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011

National Cybersecurity Awareness Campaign. Kids Presentation

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

The Dating Guide to SEO

WHITE PAPER: THREAT INTELLIGENCE RANKING

Big Data for Banks: 5 Profitable Use Cases

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step # Name: Hour:

How to Structure Your First BPM Project to Avoid Disaster

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

INTO SMART CRISIS PREVENTION

3 Ways to Restore Salesforce Data

VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents

What is a process? So a good process must:

Using Mindjet Software and Templates for Strategic Consulting

NORTON CYBERSECURITY INSIGHTS REPORT

Stand OUT Stay TOP of mind Sell MORE

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Reputation Management for Local Businesses: Protect Your Image

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

Workday Big Data Analytics

How CNCERT/CC fighting to Botnets. Dr.Mingqi CHEN CNCERT/CC March 31, Beijing

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Transcription:

Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis

Background Security Analytics : Concept of using data mining and AI in security Presented techniques and theories that we could use This Talk: Move from theory to practical applications Provide scenarios and examples to leverage these techniques for your research 2

Introduction Traditional warfare vs. Information Security Very similar Reconnaissance, information gathering, and espionage play an important part in battle tactics 3

This is Sparta! Anyone watched 300? Spartans: they knew and understood the terrain Persians: They did not win because of overwhelming numbers, they actually won because someone told them about a hidden pass. 4

Information Security In information security: Not only in hacking systems The more information you have, you ll have a better chance to protect you organization Drafting good policies and procedures as well as picking the correct tools and techniques based on the information that you have. 5

Words of Wisdom It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles - Sun Tzu 6

Information Warfare Information Warfare The use and management of information in pursuit of a competitive advantage over an opponent Information are just 1 s and 0 s if not used properly Analysis makes information meaningful - INTELLIGENCE 7

The Business of Information Warfare People who are into the Information Warfare Business: CIA FBI NSA Information Awareness Office Foreign Governments 8

Projects Government Projects: ECHELON TALON ADVISE MATRIX Able Danger Large endeavors! 9

Challenges Amount of data: there s just too much Resources: way too little Data Data Data Challenge Intelligence 10

The Veritas Project Veritas is latin for Truth The Veritas Project Modeled in the same general threat intelligence premise Primarily based on community sharing approach and using tools, technologies, and techniques that are freely available. Hawaii Honeynet Project and Secure- DNA 11

An Analogy Field Agents Decision Makers Information Warfare HQ Analysts 12

Framework Data Collection Decision Making Framework Data Storage Data Analysis 13

Data Collection Sources of Data Depends on what you want to research Forums Bulletins Chat logs News Articles Blogs Word documents The more you can gather, the better results It s not as easy, unless you re Google 14

Data Storage Information can be stored in: Relational databases Flat files Possibly the easiest part of all this 15

Analysis Possible the most important aspect of the framework Crunching large amount of data. Making data and information meaningful Some Data Mining and Artificial Intelligence Concepts K-Means Neural Networks SVM A lot more Not too easy but there are a lot of tools out there 16

Data Analysis Tools Some very useful tools that are free Text Garden Ontogen Weka Rapid Miner Tanagra Orange MEAD 17

Human Factor Why do we need humans? Interpretation of Results and Analysis = Intelligence 18

Demo Scenarios Let s look at the scenarios that you can use as templates for your own research 19

Applications Examples Trends Research Malware Taxonomy Monitoring Persons of Interest Corporate Intelligence - Strategy Opinion Polls What people are thinking about 20

Trends Research Track increases in chatter across time Gives researchers focus Find relationships between topics Framework Data Collection Crawlers (News articles, Forums) Data Storage MySQL Analysis Text Garden (html2txt, txt2bow, bowkmeans) Decision Making Me! 21

China Activity 22

China Computer Assisted 23

China Nuclear / Power 24

Thought Cloud 25

Defcon 26

Defcon Sumbissions 27

Defcon Crime 28

Conclusion Defcon = Crime 29

irobot! 30

Skynet? 31

Malware Taxonomy Grouping similar malwares together Framework Data Collection Notes from Malware Analysts Data Storage Flat files Analysis Ontogen Decision Making Depends 32

Thousands of malware descriptions 33

Unsupervised Learning 34

Monitoring Persons of Interest Monitoring of chat logs and finding persons of interest and who they talk to. Cells. 35

Monitoring Persons of Interest 36

Monitoring Persons of Interest 37

Corporate Intelligence Using data mining to profile companies to determine strategy 38

What the Public is Thinking About Obama Town Hall Meeting Data mining of over 100,000 questions to get a pulse of what people are concerned about Healthcare 39

Our Love Affair with Marijuana 40

Future Contributors Sentiment Analysis Good or Bad? We need more data! 41

Acknowledgements Howard Van de Vaarst Chris Potter Secure DNA management University of Santo Tomas (Philippines) Blaz Fortuna (Ontogen) Jozef Stefan Institute, Slovenia (Text Garden) 42

Mahalo The Veritas Project 43