Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity



Similar documents
FireSphere Advanced APT Defense Web and Application Security Mobile Security

Concierge SIEM Reporting Overview

Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Content-ID. Content-ID URLS THREATS DATA

On-Premises DDoS Mitigation for the Enterprise

The Hillstone and Trend Micro Joint Solution

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Cisco Cyber Threat Defense - Visibility and Network Prevention

How Do Threat Actors Move Deeper Into Your Network?

Bridging the gap between COTS tool alerting and raw data analysis

SANS Top 20 Critical Controls for Effective Cyber Defense

Breach Found. Did It Hurt?

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Defending Against Data Beaches: Internal Controls for Cybersecurity

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Comprehensive Advanced Threat Defense

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Firewall Testing Methodology W H I T E P A P E R

Defending Against Cyber Attacks with SessionLevel Network Security

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Content Security: Protect Your Network with Five Must-Haves

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Breaking the Cyber Attack Lifecycle

Covert Operations: Kill Chain Actions using Security Analytics

Effective Methods to Detect Current Security Threats

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Top 20 Critical Security Controls

How Attackers are Targeting Your Mobile Devices. Wade Williamson

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Effective Methods to Detect Current Security Threats

Chapter 11 Cloud Application Development

Cisco Advanced Malware Protection for Endpoints

Carbon Black and Palo Alto Networks

Next-Generation Network Security: A Buyers Guide

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Advanced Threats: The New World Order

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

DATA SHEET. What Darktrace Finds

NetFlow Tips and Tricks

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Cloud Based Secure Web Gateway

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Perspectives on Cybersecurity in Healthcare June 2015

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

74% 96 Action Items. Compliance

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Advanced Persistent Threats

Advanced approach to network security and performance monitoring

Securing and Monitoring BYOD Networks using NetFlow

DPI and Metadata for Cybersecurity Applications

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Speed Up Incident Response with Actionable Forensic Analytics

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

24/7 Visibility into Advanced Malware on Networks and Endpoints

Streamline Risk Management by Automating the SANS 20 Critical Security Controls

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Security Toolsets for ISP Defense

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Combating a new generation of cybercriminal with in-depth security monitoring

Intrusion Detection System

Check Point: Sandblast Zero-Day protection

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

RSA Security Analytics

Introducing IBM s Advanced Threat Protection Platform

A New Perspective on Protecting Critical Networks from Attack:

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Eliminating Cybersecurity Blind Spots

THE EVOLUTION OF SIEM

DYNAMIC DNS: DATA EXFILTRATION

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Centre for the Protection of National Infrastructure Effective Log Management

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Cyber Essentials. Test Specification

Application Note. Onsight Connect Network Requirements v6.3

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Know Your Enemy Lite: Proxy Threats - Socks v666

Cisco Advanced Malware Protection

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

Unified Security, ATP and more

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Transcription:

Detecting Threats Via Network Anomalies Paul Martini Cofounder and CEO iboss Cybersecurity

Why is Anomaly Detection Important? Largest enterprises with the biggest investment in prevention are still getting breached Signatureless defenses like sandboxes are being evaded Even solutions that can find active infections or C&C callbacks, can t stop data exfiltration

Evasive Malware Will Find a Way into Your Network Using non-standard ports: High streaming UDP ports Tunneling through allowed protocols: SSL, SSH, DNS Using circumvention protocols such as TOR

Malware Will Get Past Your Sandbox By detecting virtualization software Comparing files against known sandbox profiles Mimicking innocuous software so it can pass through undetected Sleeping until human movement is detected Hiding code in a registry key so there's no file presence

Once You re Infected, Dwell Time Starts Ticking It s the gap between when an active infection gets in your network and when it is detected The longer the dwell time, the greater the data loss Preventive measures can t reduce dwell time

Dwell Time is Your Biggest Enemy Data can leave the network unnoticed via different routes How will you know: o What data has been compromised? o How much data was lost? o Where did it go? o Is it still being exfiltrated? Cloud File Storage Anthem breach involved data uploaded to cloud storage Home and Small Business Servers TOR exploits leverage unprotected home computers and small business networks 50+ Connections Suspicious number of connections with small payload continuously sent Large Transfer Large amount of data leaves over the weekend to location in China

Analyze Outbound Traffic Anomalies Reduces dwell time by detecting changes in data behavior from normal and alerts regardless of signature-based malware communication Why are the servers generating 36GB of traffic when they normally generate less than 1GB? Undetected Malware Successfully Loaded Unauthorized Data Exfiltration Window Malware Finally Detected & Removed Days Later

Create Smart Network Baselines Baseline sensitive servers hosting sensitive data Alert & respond on anomalous transfers to high risk countries Use baselines that adaptively learn normal data behavior

Monitor Network Servers & Devices Choose the objects you want to measure o Individual devices: Desktops, Servers, Tablets o Network subnets such as BYOD wireless networks, database servers o Decide how and when to measure, what are the best parameters?

Monitor Critical Systems Track abnormal behavior with continuous monitoring of o Bytes in/out o Number of connections o Number of packets o Protocol o Communication destination

Automatically Contain Data Exfiltration Automatically stop suspicious transfers regardless of malware detection Allows normal traffic to pass, while containing compromised traffic Apply triggers per server, device, location, users/group, size, connection, destination

Remediate in Real Time Its critical to receive actionable intelligence: the compete context of threats allows you to remediate quickly With answers to: o o o o o Who and what devices were involved? When and where did it originate? What were its callback destinations? Is it truly over? Historical evidence: Can it happen again?

So How Do We This Gap?

By increasing investments in post infection pre-detection monitoring (dwell time) Monitor traffic, report on infections and automatically contain data exfiltration (not relying on Netflow) Apply network baselining to detect anomalous traffic bi-directionally

Inventory the security solutions on your network: SOLUTIONS YOU MAY HAVE: SWG Firewall IPS File Sandboxes

And look for technologies which detect & contain data anomalies CAPABILITIES TO CONSIDER: Network baselining to continuously monitor for anomalies and alert your team in real time to reduce infection dwell time Contain these anomalies to allow you to respond and reduce data loss

Thank you! For more information contact us below www.iboss.com info@iboss.com facebook.com/ibossconnect @ibossconnect linkedin.com/company/iboss-network-security 1 (877) 742-6832