Practical examples of Big Data, security analytics and visualization



Similar documents
Hunting for the Undefined Threat: Advanced Analytics & Visualization

Defining, building, and making use cases work

All about Threat Central

Evolution Of Cyber Threats & Defense Approaches

Critical Security Controls

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

The SIEM Evaluator s Guide

BlackRidge Technology Transport Access Control: Overview

Concierge SIEM Reporting Overview

How To Choose A Network Firewall

All Information is derived from Mandiant consulting in a non-classified environment.

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

End-user Security Analytics Strengthens Protection with ArcSight

Meeting the Challenges of Virtualization Security

Analyzing HTTP/HTTPS Traffic Logs

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Security Operation Centre 5th generation

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

Chapter 11 Cloud Application Development

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Putting Web Threat Protection and Content Filtering in the Cloud

How To Use Hp Vertica Ondemand

DDoS Protection Technology White Paper

Digitization of Enterprise - New Style of IT

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Fighting Advanced Threats

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

IBM Security IBM Corporation IBM Corporation

SANS Top 20 Critical Controls for Effective Cyber Defense

Cisco RSA Announcement Update

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Cisco & Big Data Security

Advanced Threats: The New World Order

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Where every interaction matters.

Discover & Investigate Advanced Threats. OVERVIEW

Direct or Transparent Proxy?

From the Bottom to the Top: The Evolution of Application Monitoring

Detect & Investigate Threats. OVERVIEW

Inspection of Encrypted HTTPS Traffic

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

On-Premises DDoS Mitigation for the Enterprise

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

IndusGuard Web Application Firewall Test Drive User Registration

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Unified Threat Management, Managed Security, and the Cloud Services Model

CAPABILITY STATEMENT

WildFire. Preparing for Modern Network Attacks

Agenda , Palo Alto Networks. Confidential and Proprietary.

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Big Data Analytics: Today's Gold Rush November 20, 2013

F5 Silverline Web Application Firewall Onboarding: Technical Note

Clavister InSight TM. Protecting Values

WHITE PAPER. Tap Technology Enables Healthcare s Digital Future

Ganzheitliches Datenmanagement

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Top 20 Critical Security Controls

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence

First Line of Defense

Cisco Cyber Threat Defense - Visibility and Network Prevention

Firewall and UTM Solutions Guide

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

ProxySG TechBrief Implementing a Reverse Proxy

13 Ways Through A Firewall What you don t know will hurt you

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Best practices and use cases for consistent, enterprise-wide SIEM security policy management

Scalability in Log Management

13 Ways Through A Firewall

How To Protect Your Cloud From Attack

Securing the Intelligent Network

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

SECURITY 2.0 LUNCHEON

Leveraging Big Data. Processing ISR Data. JP Morgenthal Cloud Ranger. Cloud and Virtual Data Center Services EMC Consulting

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Injazat s Managed Services Portfolio

Are Second Generation Firewalls Good for Industrial Control Systems?

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Hedge Funds & the Cloud: The Pros, Cons and Considerations

Transcription:

Practical examples of Big Data, security analytics and visualization Jeff McGee, Data Scientist Josh Stevens, Enterprise Security Architect

Objective Identify problems in Security that could be solved with better analytics Discuss recent efforts on Big Data and Visualization Share examples of how HP s Cyber Defense Center has leveraged these capabilities 3

Big Data and the data overload

Challenge: There is more noise Good guys are making things less predictable Mobile Bring your own device Virtual machines and the Cloud SAAS New sources of logs HIPPA, SOX, PCI 5

Challenge: There is less signal And bad guys know how to stay inside the bell curve. Known: Easier to detect Unknown: Harder to detect Matches a signature Goes to a bad place Works in the clear Unauthorized Use Outside of baseline Within monitored infrastructure New behavior Goes to an approved place Works encrypted Authorized Use Inside of baseline Outside monitored infrastructure 6

Solutions to big data problems Let s take techniques originally built for other domains and apply them to security: Map-reduce Columnar Data Stores Machine Learning Visualization Tools 7

Tools and technologies Hadoop Framework for distributed computing Vertica Columnar database Tableau Visualization software Numpy/Scikit-learn Machine learning tools ArcSight Vertica analytic platform Hunt teams Security intelligence 8

Overview: The Vertica analytic platform Purpose built for Big Data from the first line of code Real time Analytics Rapid iterative conversations with your data Proven Scalability Store & Analyze PBs Ingest 30 TB/hour Open & Extensible Works with Hadoop, R Ecosystem of Visualization Tools, SDKs and Community Low TCO Efficient compressed storage Scale-out architecture Easy to setup & manage Software Only Private Cloud Public Cloud Appliance Flexible to deploy 9

Network-based IDS/IPS /Suspicious Network-based IDS/IPS /Recon Network-based IDS/IPS /Informational Router Network-based IDS/IPS /Compromise Content Security Firewall /Normal Firewall Applications Firewall Applications /Informational Network Monitoring /Informational Operating System /Informational Firewall Network Monitoring Security visualization Practical examples bust6 Category Device Type Applications Content Security Firewall Host-based IDS/IPS Mainframe Network Monitoring Network-based IDS/IPS Operating System Router VPN 10

Security management

View at a glance 100M fromafarsourcept Category Significance Count of Destination Port 0 20,000,000 40,000,000 66,854,010 90M Applications Count of Destination Port 80M 0 66,854,010 Firewall Applications 70M 60M Host-based IDS/IPS Network Monitoring 50M Applications Co 40M Network-based IDS/IPS 30M Firewall Operating System 20M Network-based IDS/IPS 10M Network-based IDS/IPS Network-based IDS/IPS 0M Network-based IDS/IPS Firewall VPN Informational/Error /Hostile /Compromise /Suspicious /Normal /Informational/Warning /Recon /Informational 12

Proportional relationships bust6 Category Device Type Applications Content Security Firewall Host-based IDS/IPS Router Firewall Operating System /Informational Mainframe Network Monitoring Network-based IDS/IPS Operating System Router Network-based Network-based IDS/IPS /Compromise Firewall VPN IDS/IPS /Suspicious Network-based IDS/IPS /Recon Applications Applications /Informational Content Security Firewall Network-based IDS/IPS /Informational Firewall /Normal Network Monitoring Network Monitoring /Informational 13

Security analysts

Starting points DeviceSeveritybyDevice Category Device Type 700M 600M 500M 400M 300M Cou 200M 100M 0M 15 Applications Content Security Database Firewall Host-based IDS/IPS Mainframe Network Monitoring Networkbased ID.. Operating System Policy Man agement Count of Device Severity for each Category Device Type. The view is filtered on Category Device Type, which keeps 13 of 20 members. Router Security Mangement VPN

Carving in desthostnameattemptfailsuccess 350M Category Outcome / Category Significance /Attempt /Failure /Success 300M 250M 200M 150M 100M 50M 0M /Informational/Error /Suspicious /Compromise /Informational /Compromise /Informational /Suspicious /Comp /Informational /Recon /Normal /Informational/Alert /Informational/Error /Informational/Warning /Recon /Normal Null Null Cou /Informational/Alert /Informational/Error /Informational/Warning Count of Destination Host Name for each Category Significance broken down by Category Outcome. The data is filtered on Destination Host Name, which excludes Null. The view is filtered on Exclusions (Category Outcome,Category Significance) and Category Outcome. The Exclusions (Category Outcome,Category Significance) filter keeps 35 members. The Category Outcome filter excludes Failure. 16

Trending attempts 17

Successes desthostnameattemptfailsuccess 350M Category Outcome / Category Significance /Attempt /Failure /Success 300M 250M 200M 150M 100M 50M 0M /Suspicious /Compromise /Informational /Compromise /Informational /Suspicious /Comp /Informational /Recon /Normal /Recon /Normal Null Null Cou 18 /Informational/Error /Informational/Alert /Informational/Error /Informational/Warning /Informational/Alert /Informational/Error /Informational/Warning Count of Destination Host Name for each Category Significance broken down by Category Outcome. The data is filtered on Destination Host Name, which excludes Null. The view is filtered on Exclusions (Category Outcome,Category Significance) and Category Outcome. The Exclusions (Category Outcome,Category Significance) filter keeps 35 members. The Copyright 2014 Hewlett-Packard Category Development Outcome filter Company, excludes L.P. Failure. The information contained herein is subject to change without notice.

Trending success by hostname 19

Actual hostnames 20

Keep in mind this is demo data however a quick internet search shows this domain has a reputation as a bullet proof server, delivering malware. Our visualization shows us it s been accessed every day for the last 30 days. 21

Bullet proof servers White spac e 22

Hunt teams Use case 1

60 days IPS data 90.. count of device severity 30 dall all scatter Device Receipt Time Device Severity High Medium Unknown Very-High 80.. 70.. 60.. 50.. Cat Network 40.. 30.. 20.. 10.. 0K 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 24

30 days 140K IPS Events Device Severity High Medium Unknown Very-High 120K 100K 80K Cat Network Co 60K 40K 20K 0K 25 Jun 3 Jun 8 Jun 13 Jun 18 Jun 23 Jun 28 Jul 3 Jul 8 Jul 13 Jul 18 Hour of Device Receipt Time [2014]

By technique 26

a Aggregate from victim tenacle fromvictim Category Technique /Exploit/Vulnerability /Policy/Breach /Traffic Anomaly/Network Layer 600 /Traffic Anomaly/Network Layer/Flow /Traffic Anomaly/Network Layer/IP Fragments 500 400 300 CouNetwork 200 100 0 Jun 7 27 Jun 12 Jun 17 Jun 22 Jun 27 Minute of Device Receipt Time [2014] Jul 2 Jul 7 Jul 12

Hunt teams Use case 2

Sonar 29

Sonar trend Destinations Source addresses 30

Hunt teams Use case 3

Bottom of the stack Informational fromafar2infoonly Network Monitoring Category Device Type Applications Content Security Database Firewall Host-based IDS/IPS Mainframe Network Monitoring Network-based IDS/IPS Operating System Policy Management Security Mangement VPN Applications Firewall Host-based IDS/IPS VPN Network-based IDS/IPS 32

VPN logging 33

Who s scanning via VPN? 34

For more information After the event Contact your sales rep Visit the HP Security Product Blog: hp.com/go/securityproductsblog 35

Please give me your feedback Session TB3273 Speaker Joshua Stevens, Jeff McGee Please fill out a survey. Hand it to the door monitor on your way out. Thank you for providing your feedback, which helps us enhance content for future events. 36

Thank you