Getting the Most Out of SIEM. Presentation Title. Data in Big Data. Presented By: Dr. Char Sample, CERT



Similar documents
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Evolution Of Cyber Threats & Defense Approaches

Big Data & Security. Aljosa Pasic 12/02/2015

WHITE PAPER: THREAT INTELLIGENCE RANKING

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

What s New in Security Analytics Be the Hunter.. Not the Hunted

Q1 Labs Corporate Overview

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

IBM Security IBM Corporation IBM Corporation

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

QRadar SIEM and Zscaler Nanolog Streaming Service

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

DYNAMIC DNS: DATA EXFILTRATION

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

locuz.com Big Data Services

SIMPLE MACHINE HEURISTIC INTELLIGENT AGENT FRAMEWORK

NEEDLE STACKS & BIG DATA: USING EVENT STREAM PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS

Can We Become Resilient to Cyber Attacks?

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

100 Hamilton Avenue Palo Alto, California PALANTIR CYBER. An End-to-End Cyber Intelligence Platform

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

What is Security Intelligence?

TIBCO Cyber Security Platform. Atif Chaughtai

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

The Big Data Paradigm Shift. Insight Through Automation

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Security Analytics for Smart Grid

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

QRadar SIEM and FireEye MPS Integration

Information Technology Policy

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Splunk: Using Big Data for Cybersecurity

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

Critical Security Controls

Big Data for Big Intel

ThreatSpike Dome: A New Approach To Security Monitoring

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Detect & Investigate Threats. OVERVIEW

IBM QRadar Security Intelligence April 2013

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My

Cyber Situational Awareness for Enterprise Security

Taking Data Analytics to the Next Level

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Using SIEM for Real- Time Threat Detection

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

The SIEM Evaluator s Guide

A New Era Of Analytic

Eight Essential Elements for Effective Threat Intelligence Management May 2015

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

HOW TO DO A SMART DATA PROJECT

Hierarchical Data Visualization. Ai Nakatani IAT 814 February 21, 2007

AGENDA. What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story. Our BIG DATA Roadmap. Hadoop PDW

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum

Become a hunter: fi nding the true value of SIEM.

SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT

Effective Methods to Detect Current Security Threats

Associate Prof. Dr. Victor Onomza Waziri

TORNADO Solution for Telecom Vertical

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov

The Future of the Advanced SOC

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

How To Make Data Streaming A Real Time Intelligence

Introducing IBM s Advanced Threat Protection Platform

Case Study: Real-time Analytics With Druid. Salil Kalia, Tech Lead, TO THE NEW Digital

5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014

Real Time Fraud Detection With Sequence Mining on Big Data Platform. Pranab Ghosh Big Data Consultant IEEE CNSV meeting, May Santa Clara, CA

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Transcription:

Getting the Most Out of SIEM Presentation Title Data in Big Data Presented By: Dr. Char Sample, CERT

Acknowledgements Dr. Ben Shniederman, UMD Big Data Big Insights George Jones, John Stogoski, CERT Alternatives to Signatures Gartner, Reality Check for Cybersecurity and Fraud Caltagirone, Pendergast & Betz, The Diamond Model of Intrusion Analysis Bhattacharya & Mitra Analytics on Big Fast Data Using Real Time Stream Data Processing Architecture 2

Introduction Defining Big Data Big Data Issues What feeds BD The signal to noise problem Gaining insights 3

What is Big Data? Lots of noise! We are drowning in information, but starved for knowledge John Naisbitt So much noise that finding the signal is difficult. Data scientists Data visualization The goal is to find ways to make sense out of the noise that works for you! 4

What is Big Data? What is different? Volume Variety Velocity What is common? Flow data Date/time stamps 5

BD - Components Security BD comes from many sources: Proxy logs, e-mail metadata, security logs (firewall, IDS, IPS, Authentication, HBSS), DNS & DHCP logs, query logs, badge data, netflow, crash-dump analysis, SIEM data, news events*. Hunt teams intuitive engineers Threat intelligence News sources 6

BD Characteristics - Events Events Methods tend to be intuitive Temporal Events Network Tree Event processing Signature: challenge signatures miss to (False negative) much AD: challenge = inform decisions, in a timely manner. (False positive) Probabilistic vs possibilistic 7

BD Characteristics - Provenance Provenance How to find ground truth data. What is the quality of the data that you are examining? Where is the data from? How did it get there? Why is data provenance is important? 8

Signal / Noise How do we separate? Shniederman, UMD: Overview, zoom, filter, details on demand Gartner: Start small and infuse with data analytics with contextual data and analytics Regardless of approach, the role of the human continues to grow, along with the complexity of that role. 9

Signal / Noise Shneiderman Start large, understand the entire picture, then look for something amiss. Zoom in on items of interest. 10

Signal / Noise Gartner Start small and pick a project where you can see results. Eventually broaden adoption of big data analytics across multiple applications. 11

BD Architecture 12

BD Processing Architecture 13

BD Architecture - Gartner 14

Signal / Noise Visualization tools Time (Palantir, Time Searcher, Lifelines) Network (Tom Sawyer, Pajek, Gephi) Trees (SpaceTree, TreeMap) Search Clusters Anomalies 15

Signal / Noise Efficient storage algorithms exist Retrieval algorithms Why this problem exists Other security issues Use of BD to predict events Clusters Markov 16

Signal / Noise Retrieval issues Query broker Architectural concerns Data node security 17

Hadoop Cluster Architecture 18

Signal/Noise 19

Data Clusters Why do they matter? What application in BD? 20

Markov Actually HMM seems to be emerging as the method of choice. Relies on learning algorithms for a data Corruption issue with collected data Kafka & Storm Kafka Message data (LinkedIn) Storm streamed data Probability models for anomalies in the BD. 21

Signal / Noise Current security analysis methods rely on a combination of techniques: Hunt teams Log files Attack trees Reputation lists Threat intelligence 22

Fusing Much of the work in security relies on human insight to fuse the data. Process lacking Methods lacking Framework lacking 23

Conclusions BD, particularly as it pertains to security data, can provide deep insights. Many issues with BD remain but certain areas, such as BD architecture appear to be starting to stabilize. Risk modeling for BD architectures will need to focus both inward and outward. An essential component will be the mix of personnel working together. Do NOT be intimidated, no one knows everything about BD, if they say they do, they are lying. 24

Q&A Questions & Answers

Backup Slides

Hunt Team Semantic Engines 27

DNS Mined Data Detecting Newly Active Domains Often times a fast flux behavior Usually gray listed Can check to learn more about the address space, who allocates the space. Sometimes information about the owner of the space can provide insights. 28

Reputation lists 29

Network Profiling Understanding the network. Tools like Flow & Wireshark can assist What about the use of deception technologies & techniques? 30