DETECTING SOPHISTICATED ONLINE ATTACKS WITH STREAMING ANALYTICS



Similar documents
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

RSA Web Threat Detection

CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

10 Things Every Web Application Firewall Should Provide Share this ebook

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Protect Your Business and Customers from Online Fraud

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

ECOMMERCE AND MERCHANT FRAUD PREVENTION

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

THE EVOLUTION OF SIEM

Covert Operations: Kill Chain Actions using Security Analytics

ThreatSpike Dome: A New Approach To Security Monitoring

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Introducing IBM s Advanced Threat Protection Platform

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

RSA Adaptive Authentication For ecommerce

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Five Trends to Track in E-Commerce Fraud

IBM SECURITY QRADAR INCIDENT FORENSICS

SANS Top 20 Critical Controls for Effective Cyber Defense

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Detect & Investigate Threats. OVERVIEW

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

CS5008: Internet Computing

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

IBM QRadar Security Intelligence April 2013

HTTPS Inspection with Cisco CWS

Security Analytics for Smart Grid

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

WHITE PAPER Moving Beyond the FFIEC Guidelines

Topics in Network Security

Bridging the gap between COTS tool alerting and raw data analysis

Spear Phishing Attacks Why They are Successful and How to Stop Them

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Where every interaction matters.

RSA Security Anatomy of an Attack Lessons learned

SECURING IDENTITIES IN CONSUMER PORTALS

Application Security Manager ASM. David Perodin F5 Engineer

INTELLIGENCE DRIVEN FRAUD PREVENTION

Next-Generation Firewalls: Critical to SMB Network Security

Guideline on Auditing and Log Management

RSA Security Analytics Security Analytics System Overview

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

QRadar SIEM and FireEye MPS Integration

Cisco Cloud Web Security

Smart Network. Smart Business. White Paper. Enabling Robust Logging of Web Applications

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Beyond passwords: Protect the mobile enterprise with smarter security solutions

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

QRadar SIEM and Zscaler Nanolog Streaming Service

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Cutting the Cost of Application Security

ACI Response to FFIEC Guidance

The Cloud App Visibility Blindspot

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Chapter 17. Transport-Level Security

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

B database Security - A Case Study

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

First Line of Defense to Protect Critical Infrastructure

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Getting Ahead of Malware

How To Protect A Web Application From Attack From A Trusted Environment

The SIEM Evaluator s Guide

Discover & Investigate Advanced Threats. OVERVIEW

Enabling Security Operations with RSA envision. August, 2009

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Defending Against Cyber Attacks with SessionLevel Network Security

ENABLING FAST RESPONSES THREAT MONITORING

Criteria for web application security check. Version

End-user Security Analytics Strengthens Protection with ArcSight

Beyond the Hype: Advanced Persistent Threats

Device Fingerprinting and Fraud Protection Whitepaper

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Combating a new generation of cybercriminal with in-depth security monitoring

Concierge SIEM Reporting Overview

Security Business Intelligence Big Data for Faster Detection/Response

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Fighting Advanced Threats

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Advanced Threats: The New World Order

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Transcription:

DETECTING SOPHISTICATED ONLINE ATTACKS WITH STREAMING ANALYTICS RSA Web Threat Detection Operationalizes Big Data to Provide Real-Time Protection from Business Logic Abuse Threats Security professionals are aware that cyber criminals have increasingly sophisticated weapons at their disposal for maneuvering through online commerce systems and stealing information. Traditional firewalls, IPS/IDS, and web application firewalls (WAFs) do little to help online businesses understand the behavior of website visitors. Instead, they narrowly focus on the network and server exploits only. Because of this gap in technology, cybercriminals are evolving to exploit a new attack vector known as business logic abuse, which results from criminals exploiting flaws in the business functionality of a website, such as shopping cart, logins and file downloads. These costly threats are growing significantly, making the job of IT professionals extremely complicated. Attackers generally use legitimate webpages to launch their schemes, once they have gained entry into a site. One example of Business Logic Abuse seen during a recent attack on a leading ecommerce site involved the use of coupons on items previously on sale. In many instances, if a sale expires but the item is still in a shopping cart, the price is saved for that cart. In the case of this retailer, coupons couldn t be applied to sale items, but once the sale expired, the shopper could use a coupon. Hundreds of carts were filled with sale-priced items, at which point all the coupons were executed and the transactions pushed through at enormous discounts. According to a recent survey of IT professionals from the Ponemon Institute and RSA Web Threat Detection 1, 90 percent of businesses report losing revenue to business logic abuse, and 88 percent of respondents say this type of attack is the most important security issue facing their companies. However, 74 percent of respondents also say they have difficulty telling the difference between real customers, and the criminals accessing their websites. The Traditional Approach Existing solutions for detecting and analyzing online criminal behavior usually identify either pre-authentication threats (infosec products) or post-authentication threats (fraud products) but not both. White Paper 1 Ponemon Institute and RSA, 2012 Web Session Intelligence & Security Report: Business Logic Abuse Edition, October 2012: http://buzz.silvertailsystems.com/ponemonstudyfullreport.html.

Prevention The Five Layers of Fraud Prevention 5 4 3 2 1 Big Data Analytics User & Account-Centric Across Multiple Channels and Products User and Account-Centric for Specific Channel Navigation-Centric Endpoint-Centric As Gartner explains in its recent report, The Five Layers of Fraud Prevention and Using Them to Beat Malware, no single layer of fraud prevention or authentication is enough to keep determined fraudsters out of enterprise systems. Multiple layers must be employed to defend against today s attacks and those that have yet to appear. 2 Armed with knowledge of the types of attacks their sites may face, IT professionals can use firewalls or rewrite software to block the traffic they assume to be dangerous. However, the business logic abuses favored by today s cybercriminals are beyond the scope of preventive solutions. Fraudulent activity committed by abusing shopping cart logic, or by manipulating rebate or gift card actions, happens alongside legitimate traffic. Detection The challenge of detecting anomalous activity in real-time requires gathering various big data sources and correlating them to understand user behavior. However, current methods of detection fall short of this goal individually, they examine only pieces of the behavior puzzle, not the entire picture. Web application firewalls (WAFs) can examine transaction signatures, but will only block traffic previously identified as a potential threat. Security information and event management (SIEM) solutions use limited data in log files to seek out behavior that seems anomalous. These solutions can only identify broad trends or rule violations; they can t correlate anomalies to individual user sessions. Investigation Flagging certain transactions for review is a commonly used tactic for detecting fraudulent activity and it served its purpose in the days when cybercriminals used exploits such as brute force attacks or stolen credit cards. However, the data that information security teams need to identify suspect transactions is often scattered among multiple systems. For example, website logs are with web admins, IP level information is with the network team, and account information is with operations. And since the team can t see a user s specific session on the website, they can t compare the incidents they are flagging to the actual use activities, so the investigators gain no insights on behavior. A more centralized approach that allows atomic analysis is needed. RSA Web Threat Detection is unique in its ability to detect anomalous website behavior by utilizing layers 2, 3, and 5, all in one platform. 2 Gartner, Gartner Says 15 Percent of Enterprises Will Adopt Layered Fraud Prevention Techniques by 2014, Oct 2, 2012: http://www.gartner.com/newsroom/id/1695014. PAGE 2

The RSA Web Threat Detection Approach Sessionization of Data One of the key differentiators of the RSA Web Threat Detection solution compared to other web analytics suites is its ability to sessionize a user s clickstream. What this means is that every click a user makes on a website to navigate from login to checkout/ logout is grouped together so that the entire stream can be utilized for analysis on a user to crowd, user to user, and individual stream basis. This is achieved in real-time by a number of innovative components, beginning with Silver Tap. Silver Tap is software installed on a server in the data center, which sniffs packets from a SPAN port configured to mirror traffic from a web server. Architecting the deployment in this manner allows RSA to be completely separate from the web server and have zero impact on latency or increased risk for connectivity issues for the end user. Silver Tap then filters and reassembles the packets to extract the TCP payload. It then parses any of several protocols, including HTTP and HTTPS, in order to extract important attributes and create metrics about the traffic at all levels of the protocol stack. Once this is all completed, the resulting messages are placed on a message-bus for distribution to the other core elements of RSA performing tasks like logging, scoring, and reporting. During the configuration of Silver Tap, RSA defines items such as the parameters that define a session cookie, the login and logout page URI, UID, SSL certificates and/or HSM information, and items such as PII that need to be hashed or truncated so as not to be captured for compliance reasons. Silver Tap immediately starts to inspect all traffic once installed, scrubbing away not only the items that have been configured to be ignored, but also all data non-essential for its purpose, such as image or video content, to limit its footprint. The data then goes through an extremely efficient compression, indexing, and storage mechanism so that the RSA solution can now perform all of its analysis, reporting, and alerting functionality. The data being stored is also one of the key differentiators of the product, as it stores and intelligently breaks apart for easy search and analysis: 1. 6 TCP transport connection attributes including IPs, ports, and the timestamp down to 100s of microseconds from EPOCH 2. 5 TCP Request/Response attributes including the Range of TCP data packet ordinals relative to the TCP connection 3. 7 SSL/TLS Transport connection attributes including the SHA-1 fingerprint of the server certificate 4. 3 SSL/TLS Request/Response attributes including the total size in bytes of the TLS record PAGE 3

Top 10 Retailer Halts Fraud and Boosts Productivity with RSA Web Threat Detection A top 10 online North American retailer, generating more than US$1 billion in annual revenue from online operations, was able to immediately begin identifying and halting fraudulent activity on its e-commerce website and improve productivity using the RSA Web Threat Detection Forensics solution. According to a Total Economic Impact report recently prepared by Forrester Research 3, the retailer s security team was spending too much time on manual processes to identify malicious activity. Its existing anti-fraud systems couldn t detect fraud when IP addresses were being processed through a proxy or when domain owners were being masked, forcing the security team to laboriously collect and reconstruct log files. Within six hours of the deployment of the RSA Web Threat Detection platform, the retailer detected malicious behavior on its websites, including site probing, targeted directory attacks, and site scraping for pricing which traditional fraud systems were not able to identify. In addition for the first time the retailer s security team gained visibility into entire web sessions and could see every click by every IP address or user on its websites. The team has been able to avoid lost revenue from criminal activity such as fraudulent gift card wins, phony rebates, and fake products posted to the retailer s websites. In addition, the retailer realized a 72 percent ROI over a threeyear period, and recognized over $4 million in benefits in the first year alone. 5. HTTP attributes: a. HTTP message ordinal (1-based, listed twice) relative to the start of the TCP cxn, e.g., 4 b. Method (GET, POST, HEAD, etc.) c. Status code d. HTTP protocol version e. URL f. HTTP headers g. GET and POST arguments 6. Multiple custom extracted attributes configurable by the administrator This allows fraud analysts to run analysis or rules on any piece of data pertaining to the traffic on their website, and for the automated Scoring Engine to run its bleeding-edge Streaming Analytics (defined later in this paper) upon it as well, in real-time. Threat Scoring The RSA Web Threat Detection scoring engine builds statistical models based on the crowd behavior, which represents the good behavior. Each use session is then compared to this model and analyzed as to whether it fits the good behavior or falls under anomalous behavior. This real-time Streaming Analytics is performed without any latency. Further, this scoring engine is able to store an in-depth traffic profile composed of hundreds of attributes in memory so that the following scores can be calculated for each click. Velocity: The attacks of automated agents are commonly characterized by unusually fast page transitions. These rates of page transitions, or velocity, are among the scores used to identify potentially fraudulent user behavior. Measuring the speed of each transition across the population of all visitors to the site, and then measuring the divergence of a particular visitor from those norms, creates this score. Behavior: This score identifies unusually frequent activity, which is often correlated with computer-based attacks or directed attacks that do not follow the usual website access pattern. It is a measure of how a session s navigation sequence is different from all other sessions. The navigation sequences are measured in terms of the frequency of page transitions. The frequency of each page transition is compared to the norm for the frequency of the same page transition across all sessions, and a score is created to quantify how far from the norm a particular session is. Parameter: Parameters submitted through GET or POST are analyzed for rarity. Parameters with highly rare are given high scores. If a parameter is submitted that is normally not present, the engine is able to detect these anomalies and score based upon them. Profile: These scores follow the same logic as the behavior scores. However, these are then compared against the user s history over a period of time. This period of time is mostly defined by the admin s choice of storage. Man in the Browser (MiB): MiB attacks are performed by malicious code operating within the user s browser or on the user s machine, and operate within the time span of a user session. This score is calculated by considering the pattern of page transitions, the geographical location of all of the actions associated with the user, and the speed of actions observed from the user, alongside multiple other elements of the transaction. Man in the Middle (MitM): MitM attacks are characterized by situations in which the attacker has gained access to, and is exploiting, the web session of another user. For example, while a user has logged into his/her banking website, a malicious user gains access to the session from another system. This cyber criminal performs cash transfers, while the user is completely unaware of any of these actions. Such attacks are detected by concurrent overlapped access to a site typically from different IP addresses by nominally one user, over a minimum number of page accesses. 3 Forrester Research, The Total Economic Impact of RSA, August 2012. PAGE 4

Once this pattern has been identified, the score is subjected to a series of score discounts that include whether the accesses report the same user-agent, whether the transactions are coming from geographically separated IP addresses, and whether the accesses include a login page. These score discounts help to identify and downplay lesssuspicious and less-consequential IP-address changes. Transactions that continue to have high scores after being subjected to these discounts are considered likely Man-inthe-Middle attacks. Session Timeout Analysis Window Model Window ( 2x Analysis Window) The Decaying Data Model The baseline data used while generating scores is organized into Data Models. A data model consists mainly of frequencies of tracked items, e.g., the number of transactions containing a certain attribute with the value John Doe. A stepwise first-order recursive linear filter configured by two parameters controls the duration of the model frame. During the configuration, the following attributes can be set. Shelf life should be set for the frequencies and other numeric model values, which represent the amount of time data should be collected and used to update the current profile. Decay factor is then configured, which works by setting an amount of time for a mathematical degradation of the data s strength for comparison over time. This is done so that the most recent data is given the most strength. The best practice for defining both attributes depends on the computational resources available and the dynamic characteristics of the site. Once a counter s decay has reached 0, its record is pruned to prevent unbounded growth of obsolete information. The Analysis Window The analysis window is a sliding window of time representing the portion of traffic to be analyzed and compared with the current data model for scoring threats. In real-time usage, the analysis window ends at the present moment. Session scores are calculated as the sum of all transaction scores within the analysis window. To ensure that we are comparing the counters from within a session to each individual session, this window should be configured as close to the average session time of a user on the website as possible. The model frame and the analysis window are largely independent. The model frame determines the population data that is used to calculate transaction scores within the analysis window. Changes to the data model due to the decay of data in the model frame will have little effect on the analysis window calculations. However, there are requirements for the time periods in that the model frame must be larger than the analysis window, which should always be larger than the sessions themselves. The duration of the model frame must be at least 2x that of the analysis window to satisfy the Nyquist sampling criterion. As a best practice, the model frame should be long enough to average out the hourly, daily, and weekly business cycles of the website, which means it should be an integral number of weeks. PAGE 5

Traditional Solution vs. RSA Web Threat Detection Requirement Traditional Solution RSA Web Threat Detection Visibility Limited view Holistic view of traffic Individual Behavior Analysis Improved Workflow Not available Multiple teams Multiple data sources Incomplete data Profile Analyzer Behavior Modeling Crowd -> User Scoring User -> Historical User Scoring One tool Holistic view of traffic End-User Experience Complex file download Zero impact until malicious behavior identified Dynamic Web Sites Simple Installation Disparate teams unable to update approaches Code install on page Customer software New box in customer path Dynamic modeling is self-learning and adaptive SPAN Port No customer impact Conclusion Catching cybercriminals in the act requires IT departments to look deeper into their web traffic, to examine many more sources of information about web visitors, and to view entire web sessions to determine what website behavior is typical for their website and what is not. Traditional approaches to detecting and preventing fraud don t paint a complete picture of website activity and don t connect the dots between various sources of data about online activity. RSA Web Threat Detection provides this visibility and empowers its customers to stay one more step ahead of criminals looking to exploit their online presence. About RSA RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.rsa.com and www.emc.com. www.emc.com/rsa RSA, the RSA logo, EMC 2, EMC and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. 2013 EMC Corporation. All rights reserved. Published in the USA. STS WP 0513 H12816