SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS



Similar documents
SPEAR PHISHING AN ENTRY POINT FOR APTS

Analyzing HTTP/HTTPS Traffic Logs

Security Analytics for Smart Grid

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Model Deployment. Dr. Saed Sayad. University of Toronto

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Endpoint Threat Detection without the Pain

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

CyberArk Privileged Threat Analytics. Solution Brief

APPLICATION PROGRAMMING INTERFACE

Unified Security, ATP and more

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Cisco Advanced Malware Protection for Endpoints

After the Attack: RSA's Security Operations Transformed

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Comprehensive Advanced Threat Defense

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

RSA Security Anatomy of an Attack Lessons learned

Cisco Advanced Malware Protection for Endpoints

Obtaining Enterprise Cybersituational

The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs Siemens AG All rights reserved

Developing Secure Software in the Age of Advanced Persistent Threats

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Managed Incident Lightweight Exchange (MILE)

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Zak Khan Director, Advanced Cyber Defence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How To Manage Security On A Networked Computer System

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Redefining SIEM to Real Time Security Intelligence

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cyber Situational Awareness for Enterprise Security

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Driving Company Security is Challenging. Centralized Management Makes it Simple.

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Secure Your Mobile Workplace

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Intelligence Driven Security

The SIEM Evaluator s Guide

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

SourceFireNext-Generation IPS

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Security strategies to stay off the Børsen front page

Palo Alto Networks. October 6

Sygate Secure Enterprise and Alcatel

Post-Access Cyber Defense

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Security Coordination with IF-MAP

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Coordinating Attack Response at Internet Scale (CARIS)

Practical Threat Intelligence. with Bromium LAVA

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Vulnerability Management

Intelligence Driven Intrusion Detection

Threat Intelligence: Friend of the Enterprise

Data Science Transforming Security Operations

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Fight fire with fire when protecting sensitive data

Using SIEM for Real- Time Threat Detection

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Cisco Cyber Threat Defense - Visibility and Network Prevention

Covert Operations: Kill Chain Actions using Security Analytics

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Fostering Incident Response and Digital Forensics Research

The Next Generation Security Operations Center

SANS Top 20 Critical Controls for Effective Cyber Defense

Guideline on Auditing and Log Management

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Introducing IBM s Advanced Threat Protection Platform

Security Intelligence Services.

SIMPLE MACHINE HEURISTIC INTELLIGENT AGENT FRAMEWORK

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Transcription:

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate

Agenda Advanced Targeted Threats & Challenges Need for Collaboration and Threat Intelligence Sharing Existing Standards Limitations in sharing incident analysis process details Proposals Extend Threat Intelligence Sharing with Machine-based Analytics Representation Leverage existing standards Human Analyst Actions Representation Propose new standards Conclusions

State of Cyber Security Evolving and Complex IT Landscape v/s Advanced Targeted Threats Determined Cyber Adversaries Custom Malware, 0 days, Social Engineering Low and Slow Multi Stage Lateral Movement Diverse Concurrent Attack Vectors P2P Encrypted C&C activity Hidden in plain sight (http, social media) Movement to the Cloud Large interdependent stacks, Newer points of attack insertion More Layers in the IT stack Virtualization (Server/Network) Mobile Clients Bring Your Own Device More Layers More Logs Newer Security Data sources Netflow, Full Packet Capture, Sandbox Indicators

State of Cyber Defense The Tools Intrusion Detection Host and Endpoint-based tools Security Incident Event Mgmt. Security Analytics The Expertise CIRT/SOC teams overburdened Lack of sufficient in-house expertise Malware Analysis, Network Intrusion Detection, Remediation

Collaboration is the key Cross-Enterprise Cyber Threat Intelligence Sharing Incident Description Enterprise 2 Enterprise 1

Challenges Incident Description Challenges in validating data quality and reliability Enterprise 1 Lack of interoperable standards (need for rich semantics supporting both human and automata parseable schematics) Enterprise 2 Risk of information leakage (usability of shared intelligence v/s risk of potential security posture compromise) Untested methods for governing 3 rd party use of sensitive information Shortage of skilled security expertise Legal and Data confidentiality requirements

Standards/Specifications to the Rescue IETF Incident Object Description Exchange Format (IODEF) Real-time Internetwork Defense (RID) MITRE Trusted Automated exchange of Indicator Information (TAXII) Structured Threat Information expression (STIX) Malware Attribute Enumeration and Classification (MAEC) Common Attack Pattern Enumeration and Classification (CAPEC) Cyber Observable expression (CybOX)

Threat Intelligence Sharing Use-Cases * from STIX Use-cases document

Threat Intelligence Sharing What questions does it answer? What was the attack When did it happen Where was it found What does the attack look like How is it affecting the environment What was the impact What was the surrounding context How quickly was it solved * from STIX Architecture document

Opportunities to extend Threat Intelligence indicators Richer Indicator/TTP Semantics How was the Indicator identified Which analytics worked better and why? What changed which helped in attack identification? What was the confidence level in the indicator? Provable validation of Indicator Authenticity to recipient organization Guidelines for Indicator Portability * from STIX Architecture document

Proposal Extend Indictor Sharing Description with Machine Analytics Representation to Describe analytics techniques used For e.g. rule-based, or data-mining or machine-learning techniques Include a sampling of the input data to help in validation and portability Leverage existing standards such as PMML Analyst Actions Representation to Describe actions performed by the human analyst Describe analyst s interpretation of machine analytics Propose new extensions

Predictive Modeling Markup Language Standardized Representation of mining models and data Encompasses the various stages in a typical data-mining/analytics task Data Dictionary definition Data Transformations Handling missing or outlier data values Model Definition Outputs Post-Processing steps Model Explanation Model Verification Supported by leading Data analytics tools vendors (commercial and open-source likewise)

PMML Example (from www.dmg.org)

PMML Mapping to Threat Intelligence W Description of which security event data was analyzed May leverage CybOX and similar standards Any pre-processing done by the source enterprise over the event data The analytics (data mining) model used by the analyst to process the event data Any specific treatment for missing values etc. performed in the analytics Any post-processing of the security analytics results W Must match to the Incident data shared in the IODEF object May leverage CybOX and similar standards

Proposed Extensions to PMML Allow incomplete data and mining models for privacy reasons Allow wild-carded model representations Enable versioning of the shared data and mining-model Allow Model Filter templates typically intelligence sharing handled via a separate sub-org

Machine-based Analytics not enough Security Analysts use a variety of tools and processes IODEF and proposed Machine Analytics extensions can convey tools information Yet, Incident Analysis process is intricately complex, requiring human intelligence and a trial-and-error methods at times Human Expertise needed for Connecting the Dots Discontinuous, brittle and human-coupled Analytics chain Need for sharing Analysts Actions over Threat intelligence feeds

Analyst Actions Representation Monitor, Log and Report on Analyst actions while handling a particular incident Relevant monitoring, and logging tools deployed on analyst workstation Monitored Analyst actions can include Analyst interactions with the workstation (keyboard inputs, clicks etc) Network interactions data (server access, downloads, network tools) Interactions with local or remote applications used in Incident Analysis Proposal Create multiple Analyst Action Charts for each analyst working on a particular incident Outputs a single final Action Chart which collates the various actions performed by the analysts while handling the incident

Analyst Action Chart Data Model Each Analyst action/step captured with Tools/Process description used in the step Process may be visual interpretation by human analyst Inputs to the tools/process Outputs of the tools/process Pre/Post conditions of the step inputs i1 i2 Analyst Action Tool Manual Local App/Script Remote outputs o1 o2

Analyst actions correlation Individual Steps are correlated; Output of previous step = Input of next step Analyst Activities monitored in time-sequence but may result in dead ends Failure paths result in dead ends in the graph structure Show success paths from inputs to final incident analysis output 1 input 1 to 2 2to 3 1 to 2 2 to 3 t1 t3 t1 t2 t3 t4 2 2 Analyst Actions on input 1 to reach output 3 t2 t4 3 failure 3 Success output

Analyst Activity Chart Annotations Analyst Annotations Human Inference of results (reasoning towards a particular conclusion) Significant meta-data about outputs IP Addresses, Strings, Files/Certs extracted, Signature of Author etc. Distinguishing behavior signature for identifying the APT Distinguishing binary signature for malware (used by APT) Opinion of Attack Attribution

Example Usage Spear Phishing STIX Representation (* STIX Use-Cases document) <cybox:observable..> <cybox:statefulmeasure..> <cybox:definedobject.. xsi:type= EmailMessage.obj.. > <EmailMessage.Obj:Header> {attachments,recipient,from,subject..} <cybox:definedobject.. xsi:type= FileObj.. > <FileObj> {Name,extension, size, hash..} <cybox:definedobject.. xsi:type= URIObj.. > <URIObj> {URL,DomainName..} <cybox:relatedobj> {WHOIS,DNSQuery,DNSRecord,IPAddress,URLs} <cybox:definedobject.. xsi:type= DNSQuery.. > <DNSQuery> {Qname,Qtype,Qclass, Question, Answer..} <cybox:definedobject.. xsi:type= DNSRecord.. > <DNSRecord> {Address Object, Resolved to..} <cybox:definedobject.. xsi:type= WHOIS.. > <WHOIS> {URI Obj..}...

Analyst Actions <cybox:observable..> <cybox:statefulmeasure..> <cybox:definedobject.. xsi:type= CmdLineObj.. > <CmdLineObj> {shell,command,time,parameters,pipes,..} <cybox:definedobject.. xsi:type= GUIActionObj.. > <CmdLineObj> {GUIApp,time, click position,key-press..} <cybox:definedobject.. xsi:type= FileObj.. > <FileObj> {Name,extension, size, hash..} <cybox-ext:analysismeasure> <cybox:definedobject.. Xsi:type= AnalystActivityObjList > <AnalystActivityObjList> <AnalystActivityObj> <src xsi:type= CmdLineObj id= 9097123123.. > <dst xsi:type= FileObj id= 8712313.. > <AnalystActivityObj> <src xsi:type= FileObj id= 8712313.. > <dst xsi:type= GUIActionObj id= 67823232 >

Machine-based Analytics <cybox:observable..> <cybox-ext:analysismeasure> <cybox:definedobject.. Xsi:type= MachineAnalyticsObj > <MachineAnalyticsObj> <PMML> <DataDictionary> <DataField name= RecipientSubOrgObj > <DataField name= FromAddress > {size,attachments,time etc} <DataField name= LDATopic1 optype= categorical > <value= urgent, europe, opportunity, millions.. <DataField name= LDATopic2 optype= categorical > <value= escalation, customer, bugreport.. <ClusteringModel modelname= k-means functionname.. > <MiningSchema> <ComparisonMeasure> <Cluster name= cluster1 > <Cluster name= cluster2 >

Conclusion Need for richer indicator semantics description Need for Machine Analytics and Analyst Actions representations Leverage PMML and proposed analyst actions for Incident description, identification and analysis representation Opportunity for IODEF/STIX extensions

Questions?