A Love Affair: Cyber Security, Big-data and Risk



Similar documents
Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance

Big Data and Security: At the Edge of Prediction

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

SANS Top 20 Critical Controls for Effective Cyber Defense

Agenda , Palo Alto Networks. Confidential and Proprietary.

Cyber Security Metrics Dashboards & Analytics

Concierge SIEM Reporting Overview

IBM QRadar Security Intelligence April 2013

Performing Advanced Incident Response Interactive Exercise

APPLICATION PROGRAMMING INTERFACE

Doris Yang Vectra Networks, Inc. June 16, 2015 The World Ahead

Defending Against Data Beaches: Internal Controls for Cybersecurity

SIEM Log Management Evolved

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Practical Steps To Securing Process Control Networks

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Changing Nature of Risk and the Role of Big Data

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM Security Intelligence Strategy

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

The webinar will begin shortly

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

DYNAMIC DNS: DATA EXFILTRATION

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Splunk: Using Big Data for Cybersecurity

How To Prevent Hacker Attacks With Network Behavior Analysis

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

TRIPWIRE NERC SOLUTION SUITE

Can We Become Resilient to Cyber Attacks?

Software that provides secure access to technology, everywhere.

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Security & Threat Detection: Go Beyond Monitoring

Cyber R &D Research Roundtable

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

High End Information Security Services

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Advanced Threats: The New World Order

Evolution Of Cyber Threats & Defense Approaches

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Security and Privacy

IBM Advanced Threat Protection Solution

QRadar SIEM and FireEye MPS Integration

The Cloud App Visibility Blindspot

Marble & MobileIron Mobile App Risk Mitigation

Top 20 Critical Security Controls

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Targeted attacks: Tools and techniques

Comprehensive Advanced Threat Defense

AMPLIFYING SECURITY INTELLIGENCE

Cisco & Big Data Security

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Beyond passwords: Protect the mobile enterprise with smarter security solutions

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Application Security Best Practices. Wally LEE Principal Consultant

Malicious Network Traffic Analysis

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

Speed Up Incident Response with Actionable Forensic Analytics

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Cybersecurity The role of Internal Audit

Fighting Advanced Threats

How To Test For Security On A Network Without Being Hacked

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

I D C A N A L Y S T C O N N E C T I O N

Penetration Testing Report Client: Business Solutions June 15 th 2015

Security strategies to stay off the Børsen front page

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Analyzing HTTP/HTTPS Traffic Logs

NERC CIP VERSION 5 COMPLIANCE

Why The Security You Bought Yesterday, Won t Save You Today

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Changing the Enterprise Security Landscape

Breaking the Cyber Attack Lifecycle

Using SIEM for Real- Time Threat Detection

Secret Server Qualys Integration Guide

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

Managed Security Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

CS 558 Internet Systems and Technologies

Ed Ferrara, MSIA, CISSP Fox School of Business

The Business Case for Security Information Management

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Cyber Intelligence Workforce

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Modular Network Security. Tyler Carter, McAfee Network Security

Web App Security Audit Services

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Transcription:

A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31

Security what s at stake On average, organizations are experiencing a staggering 643 Web-based malicious events each week incidents that effectively penetrate the traditional security infrastructure. FireEye Advanced Threat Report 1H 2012 Released August 29, 2012 2

Security what s at stake We need to stop what has been the greatest transfer of wealth in history that U.S. companies lose to foreign hackers. Army Gen. Keith B. Alexander, NSA Director 3 3

Understanding Unknown Threats, or Thinking like a Criminal Where is the most important and valuable data? What s the typical patch cycle for applications and operating systems? What are the typical security defenses? How does the IT team prioritize vulnerabilities? What structural information silos that exist for the security team? Are normal IT service user activities routinely monitored and correlated? 4

Top challenges in log management SANS Log Management Survey 2012 5

What s Big-data? The Three Vs Data volume Data variety Data velocity All too much for a traditional data store 6

Unknown threats defining Security Intelligence Enterprise Security Intelligence is: The collection of data from all IT systems in the enterprise that could be security relevant and The application of the security team s knowledge and skill Resulting in risk reduction Prepare for the Emergence of Enterprise Security Intelligence, Joseph Feiman, Gartner, June 29, 2011 7 7

The spheres of security data All Security Relevant Data Security Relevant Data Normal user and machine generated data credentialed activities unknown threats are behavior bases -- require analytics SIEM Known events as seen by current security architecture vendor supplied 8 8

Cybersecurity Risks are Business Risk Machine / System Logs SCADA Data Application Data Access Control Customers Attacker Behavior Data Social Networking Data Physical Access Data Business Activity Data Event Context ERP / CRM Traditional Security Data Supply Chain Partner Activities Business Activity Data Human Resources Knowing what s normal and what s not requires big-data, context, and analytics 9

Detecting the malicious insider data required Email Time Locatio n Proxy data Browsing History IP Address DHCP / DNS Badge Supervisor Date

Problem with traditional log management / SIEM architectures Typical SIEM Architecture Have to know what you need for investigation before you need it Useful data can come from anywhere not just what s supported by the vendor Lack of scalability restricts visibility Creates vendor dependancy The cold case problem Data Reduction Model 11 11

The Cold Case Problem with SIEM January February March April Reinvestigating the crime client=unknow n[99.120.205.2 49]<160>Jan 2616:27 (cjffnms Not possible to add new information to old security events truncating integer value > 32 bits <46>Jan ASCII from client=unknown DHCPACK=A SCII from host=85.196. 82.110 12 12

How do you match wits with the creative attacker? Creativity -- Convergent and Divergent Thinking 13

Big-data and Creative Security Thinking Divergent Thinking: The Aha moment / Spontaneous epiphany Remote associative processes Pattern-based thinking Convergent Thinking: About analysis and attention The act of un-concealing chiseling away at a problem Write a symphony / poem / solve an algebraic equation Stick with a problem till it cries uncle 14

Security Intelligence Needs a New Architecture Specific behavior based pattern modeling for humans and machines Based on combinations of: Location Role Data/Asset type Data/Asset criticality Action type How long did the action take Time of day No up front normalization Time-indexed Data Analytics and Statistics Commands Correlation Pattern Analysis Data Inclusion Model 15

Mathematics and statistical analysis Helps you to baseline and easily add caveats to understand normal. Use average, mean, and standard deviation to determine outliers. Understand what s abnormal as a starting point for an investigation. Solutions that feature statistical analysis don t reach obsolescence. 16 16

The Way Forward Risk-base Scenario Thinking Operationalize capture-the-flag or red-team blue team exercises Or, how would you do to steal data from your organization without them knowing? What activities would you perform? How would these manifest in log data (or the absence of log data)? What would the activity patterns look like over time? How can we implement call and response to automate the investigator mindset? 17

Find Email and Web Drive-by attacks Action Phase Source SQL Injection Infiltration WebLogs Password Brutes DNS Exfil Infiltration Exfiltration Web Crawling Reconnaissance Auth Logs DNS logs/fw Logs Web/FTP Logs Port Knocking Exfil/CnC Firewall 18 Splunk Search len(_raw) +2.5stddev short delta _time count +2.5stddev count(src_ip) +2.5stddev count(deny) by ip Why Hacker puts SQL commands in the URL; URL length is standard deviations higher than normal Automated password guessing tools enter credentials much faster than humanly possible Hackers exfiltrate the data in DNS packet; standard deviations more DNS requests from a single IP Web crawlers (copying the web site for comments, passwords, email addresses, etc) will be the source IP behind page requests standard deviations higher than normal Threat does inside-out port scan to identify exfiltration paths 18

Statistical Analysis Action Phase Source Splunk Search Spear Phishing Infiltration Mail Logs Affinity of Sender Bad Mail Links Infiltration Mail Logs Domain Affinity Low/slow exfil Exfiltration Proxy/FW logs Avg(bytes)/GET Why Spear phishing sender address has likely never been seen by the company s mail servers URL likely has never been seen by the company s web servers --fingerprint attackers Small amounts of data leaving in many sessions over time Form based exfil Exfiltration Proxy Logs HTTP CnC Exfil/CnC Proxy Logs 19 Transaction: Post w/o GET Long URL w/o Referrer Large amounts of data leaving in few sessions. POST without GET implies automated process Botnets often embed long CnC message in the URL 19

Account take-overs and statistical analysis Account takeover statistical analytics and thresholds Behavior of logins and password changes and resets Analysis of same IP multiple password resets Multiple IPs -- resetting the same account How many times people change their bank information How many times they change their credit card information 20 20

Data Convergence for Security and Risk Security Relevant Data Confidentiality / Integrity / Availability CSO / CIO / CEO Views App Mgmt IT Ops Compliance Web Analytics Business Analytics 21 21

The Security Intelligence Platform Traditional and non-traditional data sources Security Intelligence for Business Security Visualizations for Executives Continuous monitoring of security posture, compliance with internal and external mandates Statistical Analysis IT risk scenario based thinking, Thinking like a criminal, Proactive Monitoring Monitoring of security infrastructure, automation of forensic analysis searches Search and Investigation Forensic investigation for security, root cause analysis, application security awareness, transaction monitoring 22

What kinds of business risk questions could you ask you data? Is the spoilage increase due to an increase in ambient temperature in the plant? What pattern of user activity did we see before they attacked the website? Who is accessing company data from outside the company but is sitting at their desk? Are the large file exchanges between these two employees normal? What distribution routes have the highest levels of theft? What was the ongoing drop off rate percentage in site visits for each day after the promotion ended? Are there employees that surf to the same website at exactly the same time every day? What s the trend of sentiment on Twitter for the new product launch? 23

Security Team Activities five key activities Prevent Verify Detect Big-data and Analytics Mitigate Respond Creating and supporting the security mental model 24

Big-data -- implications for compliance Better visibility in to processes Audit supply chain Audit business processes Centralized Analytics Audit results are more reliable and consistent Audit process is more consistent, efficient and repeatable Audit costs significantly reduced 25

Questions mseward@splunk.com 26