1 GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Presented at RMISC, May 14 – 15 2014 by Kelly Feagans – Senior Sales Engineer, Splunk.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Nathan Labadie Systems Engineer, US-Central FireEye
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
© 2009 VMware Inc. All rights reserved View Pool Image Configuration Considerations for Gold Images around Application virtualization and performance.
Virtualization & Disaster Recovery
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Jay Flanyak Channel Business Manager
1 Contract Inactivation & Replacement Fly-in Action ( Continue to Page Down/Click on each page…) Electronic Document Access (EDA)
“The Honeywell Web-based Corrective Action Solution”
1© Copyright 2013 EMC Corporation. All rights reserved. EMC STORAGE ANALYTICS With VNX and VMAX Support.
powerful network monitoring & management solution
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 How Do I Order From.decimal? Rev 05/04/09 This instructional training document may be updated at anytime. Please visit and check the.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
What’s New in WatchGuard Dimension v1.2
IT Analytics for Symantec Endpoint Protection
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO.
Installing Windows XP Professional Using Attended Installation Slide 1 of 30Session 8 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Good Guys vs. Bad Guys Using Big Data to Counteract Advanced Threats
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Tim Davidson System Engineer
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Information Security in Real Business
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Norman SecureSurf Protect your users when surfing the Internet.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
Honeypot and Intrusion Detection System
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Russell Rice Senior Director, Product Management Skyport Systems
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2016 You Have Alerts. Now What? Brian Carrier VP of Digital Forensics Basis Technology 1.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Proactive Incident Response
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
OIT Security Operations
Joe, Larry, Josh, Susan, Mary, & Ken
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure once, run anywhere Simplify your security with Sophos
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Microsoft Data Insights Summit
6. Application Software Security
Per Söderqvist Per Söderqvist Sales Engineer
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

1 GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Presented at RMISC, May 14 – by Kelly Feagans – Senior Sales Engineer, Splunk Dave Herrald – Principal Security Consultant, GTRI Content by Joe Goldberg, Splunk

Security Presentation Template 2 Scare them Unscare them

Security Presentation Template 3 Big Data Advanced Threats

Here Comes the Scary Part….. 4

Advanced Threats Outpace the Defenders 5 Adversary You Time Technical Capabilities

Advanced Threats Are Hard to Detect 6 100% Valid credentials were used 40 Average # of systems accessed 243 Median # of days before detection 63% Of victims were notified by external entity Source: Mandiant M-Trends Report 2012 and 2013

Advanced Threat Pattern – Not Signature Based 7 Infiltration Back Door Exfiltration Data Gathering Recon Phishing or web drive-by. has attached malware or link to malware Malware installs remote access toolkit(s) Malware obtains credentials to key systems and identifies valuable data Data is acquired and staged for exfiltration Data is exfiltrated as encrypted files via HTTP/S, FTP, DNS

8 Traditional SIEMs Miss The Threats  Limited view of security threats. Difficult to collect all data sources. Costly, custom collectors. Datastore w/schema.  Inflexible search/reporting hampers investigations and threat detection  Scale/speed issues impede ability to do fast analytics  Difficult to deploy and manage; often multiple products

Better Defensive Cybersecurity Tools Needed 9

Here Comes The Solution 10 Big Data

Big Data is Used Across IT and the Business 11 IT Ops Security Compliance App Mgmt Fraud Business Intelligence Big Data

“Big Data” Definition  Wikipedia: Collection of data sets so large and complex that it becomes difficult to process using database management tools  Gartner: The Three Vs  Data volume  Data variety  Data velocity  Security has always been a Big Data problem; now it has a solution 12

Machine Data / Logs are Big Data :21: TCP_HIT OBSERVED GET HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR ; InfoPath.1; MS-RTC LM 8;.NET CLR ;.NET CLR ; ) User John Doe," 08/09/ :23: event_status="(0)The operation completed successfully. "pid=1300 process_image="\John Doe\Device\HarddiskVolume1\Windows\System32\neverseenbefore.exe“ registry_type ="CreateKey"key_path="\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Printers Print\Providers\ John Doe-PC\Printers\{}\ NeverSeenbefore" data_type"" Endpoint Logs Web Proxy Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: :19:12,Inserted: :20:12,End: :19:12,Domain: Default,Group: My Company\ACME Remote,Server: acmesep01,User: smithe,Source computer:,Source IP: Caption=ACME-2975EB\Administrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: TrueName=Administrator SID =S SIDType=1 Status=Degradedwmi_ type=UserAccounts Anti-virus Authentications

Big Data Analytics 14 Security for Business Innovation Council report, “When Advanced Persistent Threats Go Mainstream,” Chuck Hollis VP – CTO, EMC Corporation “The core of the most effective [advanced threat] response appears to be a new breed of security analytics that help quickly detect anomalous patterns -- basically power tools in the hands of a new and important sub-category of data scientists: the security analytics expert..” “[Security teams need] an analytical engine to sift through massive amounts of real-time and historical data at high speeds to develop trending on user and system activity and reveal anomalies that indicate compromise.” 14

15 Step 1: Collect ALL The Data in One Location Intrusion Detection Firewall Data Loss Prevention Anti- Malware Vulnerability Scans Traditional SIEM Authentication 15

Need Both Network and Endpoint And Inbound/Outbound! 16

Enrich Indexed Data with External Data / Lookups 17 Geo-IP Mapping 3 rd -party threat intel Asset Info Prohibited Services / Apps Critical Network Segments / Honeypots Employee Info

Step 2: Identify Threat Activity 18  What’s the M.O. of the attacker? (think like a criminal)  What/who are the most critical assets and employees?  What minute patterns/correlations in ‘normal’ IT activities would represent ‘abnormal’ activity?  What in my environment is different/new/changed?  What is rarely seen or standard deviations off the norm?

Big Data Solution 19 Big Data Architecture Data Inclusion Model All the original data from any source No database schema to limit investigations/detection Lookups against external data sources Search & reporting flexibility Advanced correlations Math/statistics to baseline and find outliers/anomalies Real-time indexing and alerting “Known” and “Unknown” threat detection Scales horizontally to 100 TB+ a day on commodity H/W One product, UI, and datastore

Big Data Solutions  Flat file datastore (not database), distributed search, commodity H/W  More than a SIEM; can use outside security/compliance 20 Incident investigations/forensics, custom reporting, correlations, APT detection, fraud detection

Sample Correlation of Unknown Threats :21: TCP_HIT OBSERVED GET HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR ; InfoPath.1; MS-RTC LM 8;.NET CLR ; ) User John Doe," 08/09/ :23: event_status="(0)The operation completed successfully. "pid=1300 process_image="\John Doe\Device\HarddiskVolume1\Windows\System32\neverseenbefore.exe“ registry_type ="CreateKey"key_path="\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Printers Print\Providers\ John Doe-PC\Printers\{}\ NeverSeenbefore" data_type"" T12:40:25.475Z,,exch-hub-den-01,,exch-mbx-cup- Please open this attachment with payroll information,,, T22:40:24.975Z Endpoint Logs Web Proxy Server All three occurring within a 24-hour period Example Correlation - Spearphishing User Name Rarely seen domain Rarely visited web site User Name Rarely seen service

Fingerprints of an Advanced Threat 22 What to Look ForWhy Data Source Attack Phase Rarely seen registry, service, DLL. Or they fail hash checks. Malware or remote access toolkit OSBack door Account creation or privilege escalation without corresponding IT service desk ticket Creating new admin accountsAD/ Service Desk logs Lateral movement A non-IT machine logging directly into multiple servers. Or chained logins. Threat accessing multiple machines AD /asset info Lateral movement For single employee: Badges in at one location, then logs in countries away Stealing credentialsBadge/ VPN/ Auth Data gathering Employee makes standard deviations more data requests from file server with confidential data than normal Gathering confidential data for theft OSData gathering Standard deviations larger traffic flows (incl DNS) from a host to a given IP Exfiltration of infoNetFlowExfiltration

Step 3: Remediate and Automate  Where else in my environment do I see the “Indicators of Compromise” (IOC)?  Remediate infected machines  Fix weaknesses, including employee education  Turn IOC into a real-time search for future threats 23

Security Realities…  Big Data is only as good as the data in it and people behind the UI  No replacement for capable practitioners  Put math and statistics to work for you  Encourage IT Security creativity and thinking outside the box  Fine tuning needed; always will be false positives 24

Recap 25  Step 1: Collect ALL The Data in One Location  Step 2: Identify Threat Activity  Step 3: Remediate and Automate

About Splunk  Big Data platform for ingesting machine data; desktop to 100+ TB/day  Many use cases within security; also outside security  Over 6500 customers total; security customers  Free download and tutorial at 26

GTRI Splunk Practice Overview Highlights:  Splunk’s 1 st Elite Partner and one of only two Splunk Certified Training Centers in the U.S.  GTRI provides end-to-end support for Splunk from pre-sales engineering to post- sales professional services, implementation, training and optimization  Splunk’s most credentialed partner in N. America:  GTRI holds over 60 Splunk Certifications:  5 Certified Architects  6 Certified Solutions Engineers (SE-I & SE-2)

Thank You!