BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg. Splunk. Session ID: HT-T08 Session Classification: Intermediate



Similar documents
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Security & Threat Detection: Go Beyond Monitoring

Splunk: Using Big Data for Cybersecurity

Building a cloud- based SIEM with Splunk Cloud and AWS

Splunk Company Overview

Comprehensive Security with Splunk and Cisco

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

A Love Affair: Cyber Security, Big-data and Risk

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Integrating a Big Data Platform into Government:

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Protecting the Infrastructure: Symantec Web Gateway

How To Make Data Streaming A Real Time Intelligence

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Using SIEM for Real- Time Threat Detection

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Leveraging Machine Data to Deliver New Insights for Business Analytics

The Future of Big Data SAS Automotive Roundtable Los Angeles, CA 5 March 2015 Mike Olson Chief Strategy Officer,

Transforming the Telecoms Business using Big Data and Analytics

Can We Become Resilient to Cyber Attacks?

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

Getting Started with Hadoop. Raanan Dagan Paul Tibaldi

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

Security Information & Event Management (SIEM)

SANS Top 20 Critical Controls for Effective Cyber Defense

Netzwerkvirtualisierung? Aber mit Sicherheit!

Enabling Security Operations with RSA envision. August, 2009

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

Big Data and Security: At the Edge of Prediction

Find the needle in the security haystack

Effective Methods to Detect Current Security Threats

IBM QRadar Security Intelligence April 2013

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

What is Security Intelligence?

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Effective Methods to Detect Current Security Threats

Big Data Management and Security

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Q1 Labs Corporate Overview

Copyright 2013 Splunk Inc. Introducing Splunk 6

BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES

QRadar SIEM and FireEye MPS Integration

Technology Highlights Of. (Medusa)

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

RSA Security Analytics

How To Create Situational Awareness

HDP Hadoop From concept to deployment.

Extending security intelligence with big data solutions

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

QRadar SIEM and Zscaler Nanolog Streaming Service

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

Sygate Secure Enterprise and Alcatel

Information Technology Policy

Intelligence-Driven Security

Tapping Into Hadoop and NoSQL Data Sources with MicroStrategy. Presented by: Jeffrey Zhang and Trishla Maru

SOLVING REAL AND BIG (DATA) PROBLEMS USING HADOOP. Eva Andreasson Cloudera

#TalendSandbox for Big Data

Security Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Introduction to Big Data Training

Metrics that Matter Security Risk Analytics

Unified Security, ATP and more

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

End-user Security Analytics Strengthens Protection with ArcSight

Big Data Analytics Nokia

Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP

How To Buy Nitro Security

THE REAL-TIME OPERATIONAL VALUE OF BIG DATA MATT DAVIES

SourceFireNext-Generation IPS

Big Data Analytics. Copyright 2011 EMC Corporation. All rights reserved.

Active Response: Automated Risk Reduction or Manual Action?

IBM Security Strategy

What s New in Security Analytics Be the Hunter.. Not the Hunted

NetFlow Analytics for Splunk

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

CALNET 3 Category 7 Network Based Management Security. Table of Contents

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

LogLogic Symantec Endpoint Protection Log Configuration Guide

Security Analytics The Beginning of the End(Point)

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Network Monitoring using MMT:

All Information is derived from Mandiant consulting in a non-classified environment.

Speed Up Incident Response with Actionable Forensic Analytics

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Transcription:

BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg Splunk Session ID: HT-T08 Session Classification: Intermediate

About Me Joe Goldberg Current: Splunk - Security Evangelist and Technical Product Marketing Past: Symantec/Vontu - Data Loss Prevention, Technical Product Marketing VMware - Technical Product Marketing Sun Microsystems - Product Marketing

Agenda Big Data defined Security problem Security solution Technology Use cases Actual deployments Cautions

Everyone is Claiming Big Data

Big Data Definition Wikipedia: Collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications Gartner: The Three Vs Data volume Data variety Data velocity Security has always been a Big Data problem; now it has a solution

The Security Problem

Advanced Threats Are Hard to Detect 100% Valid credentials were used 243 Median # of days before detection 40 Average # of systems accessed 63% Of victims were notified by external entity And threats are hard to investigate Source: Mandiant M-Trends Report 2012 and 2013

Need all the Data Databases Email Web Desktops Servers DHCP/ DNS Network Flows Hypervisor Badges Firewall Traditional Sources Authentication Vulnerability Scans Custom Apps Service Desk Storage Mobile Intrusion Detection Data Loss Prevention Anti- Malware Industrial Control Call Records

Sources Email Server Machine Data / Logs 2013-08-09T12:40:25.475Z,,exch-hub-den-01,,exch-mbx-cup- 00,,,STOREDRIVER,DELIVER,79426,<20130809050115.18154.11234@acme.com>,johndoe@acme.com,,685191,1,,, hacker@neverseenbefore.com, Please open this attachment with payroll information,,,2013-08- 09T22:40:24.975Z Web Proxy Endpoint Logs Windows Authentication Endpoint Security 2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8;.NET CLR 1.1.4322;.NET CLR 3.0.4506.2152; ) User John Doe," 20130806041221.000000Caption=ACME-2975EB\Administrator Description=Built-in account for administering the computer/domaindomain=acme-2975eb InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=useraccounts 08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300 process_image="\john Doe\Device\HarddiskVolume1\Windows\System32\neverseenbefore.exe registry_type ="CreateKey"key_path="\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Printers Print\Providers\ John Doe-PC\Printers\{}\ NeverSeenbefore" data_type"" Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My Company\ACME Remote,Server: acmesep01,user: smithe,source computer:,source IP: 10.11.36.20

Need Both Network and Endpoint And Inbound/Outbound!

The Traditional SIEM Problem Log Data End Point Protection Firewall Authenticat ions IDS Logger SIEM Limited ability to do threat detection and investigation Limited data sources it can ingest Data reduction / normalization RDMS is single chokepoint causing scale and speed issues Does not meet the definition of Big Data

Big Data as a Solution

Big Data Technologies Not a SQL data store; distributed search Aster Data Greenplum Cassandra Hbase MangoDB Hadoop Splunk SQL & Map/Reduce NoSQL, flat files, Map/Reduce Map / Reduce Flat files, Map/Reduce, RT processing Relational Database (highly structured) Key/Value, Tables or Other (semi-structured) Temporal, Unstructured Heterogeneous Time

Big Data SIEM/ Security Analytics GPS, RFID, Hypervisor, Web Servers, Email, Messaging, Clickstreams, Mobile, Telephony, IVR, Databases Ad hoc search Monitor and alert Custom dashboards Report and analyze Developer Platform Real-time Machine Data Big Data SIEM Sensors, Telematics, Storage, Servers, Security devices, Desktops, CDRs Native, flat file storage Other Big Data stores External Sources / Feeds

Enrich Data With External Context Extend search with lookups and external data sources LDAP, AD IP watch Lists Big Data SIEM CMDB Reference Lookups Domain watch Lists

Big-Data SIEM / Security Analytics

Big Data Security/SIEM Use Cases

Big Data Security/SIEM Use Cases Incident Investigations & Forensics Security & Compliance Reporting Real-time Monitoring of Known Threats Real-time Monitoring of Unknown Threats Fraud detection Big Data

Case #1 - Incident Investigation / Forensics Often initiated by alert in another product May be a cold case investigation requiring machine data going back months Need all the original data in one place and a fast way to search it to answer: What happened and was it a false positive? How did the threat get in, where have they gone, and did they steal any data? Has this occurred elsewhere in the past? Take results and turn them into a realtime search/alert if needed January February March April DHCPACK =ASCII from host=85.19 6.82.110 client=unknown[ 99.120.205.249] <160>Jan 2616:27 (cjffnms truncating integer value > 32 bits <46>Jan ASCII from client=unknow n

Case #2 Security/Compliance Reporting Many types of visualizations Ad-hoc auditor reports New incident list Historical reports SOC/NOC dashboards Executive/auditor dashboards

Case #3 Real-time Monitoring of Known Threats Sources Windows Authentication Endpoint Security Intrusion Detection Example Correlation Data Loss 20130806041221.000000Caption=ACME-2975EB\Administrator Description=Built-in account for administering the computer/domaindomain=acme-2975eb InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 Default Admin Account 500SIDType=1 Source IP Status=Degradedwmi_ type=useraccounts Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual Malware action: Found Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: Source IP My Company\ACME Remote,Server: acmesep01,user: smithe,source computer:,source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Source Privacy IP Violation] Credit Card Number Detected in Clear Text [Priority: 2]: Data Loss Time Range All three occurring within a 24-hour period

Case #4 Real-time Monitoring of Unknown Threats Sources Email Server Web Proxy Endpoint Logs 2013-08-09T12:40:25.475Z,,exch-hub-den-01,,exch-mbx-cup- 00,,,STOREDRIVER,DELIVER,79426,<20130809050115.18154.11234@acme.com>,johndoe@acme.com,,685191,1,,, hacker@neverseenbefore.com, Please open this attachment with payroll information,,,2013-08- 09T22:40:24.975Z Rarely seen email domain Rarely visited web site Example Correlation - Spearphishing 2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8;.NET CLR 1.1.4322;.NET CLR 3.0.4506.2152; ) User John Doe," User Name User Name User Name 08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300 process_image="\john Doe\Device\HarddiskVolume1\Windows\System32\neverseenbefore.exe registry_type ="CreateKey"key_path="\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Printers Print\Providers\ John Doe-PC\Printers\{}\ NeverSeenbefore" data_type"" Rarely seen service All three occurring within a 24-hour period Time Range

Case #4 continued Step 1 Collect ALL the data in one location Step 2 Baseline/identify normal activity Step 3 Find outliers/anomalies Abnormal patterns/correlations within normal activities What is rarely seen or standard deviations off the norm What is different/new/changed

Case #5 Fraud Detection Vertical Financial Services Healthcare E-tailing Telecom Online education Type of Fraud Account takeover Physician billing Account takeover Roaming abuse Student loan fraud Pattern of fraud Many transactions between $9-10k Physician billing for drugs outside their expertise area Many accounts accessed from one IP Excessive roaming on partner network by unlimited use customers Student IP in high-risk country and student absent from classes & assignments

Actual Deployments of Big Data

Complement vs Replace Traditional SIEM Often Big Data replaces a traditional SIEM SIEM & Big Data all in one Or Big Data complements a traditional SIEM 3 common complementary deployment options

Option 1 Standalone Big Data SIEM Data sent to both vendors Big Data for incident investigations/forensics, nonsecurity use cases Traditional SIEM for threat detection, alerts, workflow, compliance Log Data End Point Protection Firewall Authenticat ions IDS Logger Traditional SIEM

Option 2 Big Data to Traditional SIEM Log Data Big Data replaces Logger Big Data for log aggregation, incident investigation/forensics, compliance, non-security use cases Traditional SIEM for threat detection, alerts, workflow End Point Protection Authenticat ions Firewall IDS Big Data SIEM Traditional SIEM

Option 3 Logger to SIEM Log Data Big Data replaces traditional SIEM Big Data for incident investigation/forensics, threat detection, alerts, workflow Logger for log aggregation Takes advantage of existing Logger deployment and connectors End Point Protection Authenticat ions Firewall IDS Logger Big Data SIEM

Cautions

Security Realities Big Data is only as good as the data it holds and the people behind the UI There is no replacement for capable practitioners Put math and statistics to work for you Encourage IT Security creativity and thinking outside the box Fine tuning needed; always will be false positives

Be Careful of Hadoop Complexity User Interface HUE Workflow APACHE OOZIE File System Mount FUSE-DFS Scheduling APACHE OOZIE Data Integration APACHE FLUME, APACHE SQOOP Languages / Compilers APACHE PIG, APACHE HIVE Fast Read/Write Access APACHE HBASE Coordination APACHE ZOOKEEPER

Watch out for Franken-SIEMs! Traditional SIEM with bolted on Hadoop Many products, data stores, UIs, middleware

Common Hadoop Scenarios IT Security Hadoop for high volume, low value data Packet captures, NetFlow, badge logs Files, not data: Images, video, phone call recordings, etc. Ok with batch processing (not real time) Fraud detection and prevention Analyze raw data from diverse sources Look for patterns of fraud TBD Not sure of the use case yet or still pilot Hadoop as a dumping ground for data

Beyond Security

Big Data Can Be Used Across IT and the Business Fosters cross-department collaboration & stronger ROI App Mgmt IT Ops Security Compliance Web Intelligence Business Analytics Big Data

Splunk For Security Big Data platform for ingesting machine data; 500MB to 100+ TB/day Flat file data store, distributed search, common data store and UI Many use cases within security Forensics, incident investigation, known and unknown threat detection, fraud detection, and compliance Many use cases outside security: IT Operations, Application Management, web analytics Over 6000 customers total; 2500+ primary security use case customers Free download and tutorial at www.splunk.com

Questions?

Thank you! Joe Goldberg Splunk jgoldberg@splunk.com www.splunk.com

Be Careful of Hadoop Complexity!

Threat Intelligence Feeds Damballa Webroot IBM X-force SANS / Dshield Block list Team CYMRU Bogonlist iblocklist Tor Sites iblocklist Traffic Proxy Bothunter Attack Sources Open Source Threat Intelligence Feeds iblocklist Spyware Project Honeypot iblocklist Web Attackers Team CYMRU Malware Hash Registry OpenBL.org SSH Blacklist MTC Malware Binary MD5s Team CYMRU Darknet iblocklist RapidShare Sites Threat Expert Last 7 Days Threat Expert Known Bad MTC Botnet C&C List Malware Patrol iblocklist Logmein iblocklist Spider Block lists Spamhaus DROP / EDROP Team CYMRU IP to ASN Commercial Threat Intelligence Feeds Secureworks Trustwave SpiderLabs Akamai Edgescape Asset and Identity Feeds Oracle IAM Maxmind Vigilant Threat Intelligence Emerging Threat Active Directory Arbor Atlas Symantec DeepSight CA CMDB IBM Tivoli IAM Mandiant Cyveillance CTI Cloudstrike Whitehat Security Open LDAP NMAP BMC Atrium