SlideShare a Scribd company logo
Copyright © 2013 Splunk Inc.

Splunk for Insider Threats
and Fraud Detection
Company
Company (NASDAQ: SPLK)
Founded 2004, first software release in 2006
HQ: San Francisco / Regional HQ: London, Hong Kong
Over 850 employees, based in 12 countries
Annual Revenue: $198M (YoY +60%)
$5+ billion market valuation

Business Model / Products
Free download to massive scale
On-premise, in the cloud and SaaS

6,000+ Customers; 2500 w/Security Use Cases
Customers in over 90 countries
60 of the Fortune 100
Fast Company 2013: Named Splunk #4 Most Innovative
Company in the World and #1 Big Data Innovator

Largest license: 100 Terabytes per day

Leader: Gartner SIEM Magic Quadrant, 2013
2
Make machine data accessible, usable
and valuable to everyone.

3
The Accelerating Pace of Data
Volume | Velocity | Variety | Variability

GPS,
RFID,
Hypervisor,
data
Web Servers,
Email, Messaging,
Clickstreams, Mobile,
Telephony, IVR, Databases,
Sensors, Telematics, Storage,
Servers, Security Devices, Desktops

Machine data is fastest growing, most
complex, most valuable area of big

4
Machine Generated Data is a Definitive
Record of Human-to-Machine and Machineto-Machine Interaction

5
Insider Threats – Employee Attitudes

52

• Percent of employees don’t believe it’s a crime to use competitor’s
confidential information

44

• Percent believe a software developer who develops source code
for a company has some ownership of work and inventions beyond
their current employer

42

• Percent don’t think it is a crime to reuse source code with out
permission from a former employer, in projects for other
companies

60

• Percent say a co-worker hired from a competing company has
offered documents from that company for their use
Ponemon Institute Survey 2012
6
Employee Insider threats
Are

Authorized users
Doing authorized things
Have malicious intent
A ‘people centric’
behavioral problem

Are not

Hackers using specialized
tools
A technical or
"cybersecurity" issue alone
Escalating their privileges for
purposes of espionage
Context for Insider Threats
• Who are your
privileged internal
people?
• Who might be a likely
enemy?
• What data that would
be at risk?

Contextual

Cyber

Psychological

Insider
Threat Risk

8
Two Strategies for Combating
Secondary
Detection

Primary
Prevention/Deterrence
•

Pattern based

•

Specific indicators or alerts

•

Multiple factors

•

Definitive evidence

•

Uses heuristics and statistical
models

•

Physical detection (stolen
documents)

•

Requires base lining / watching
for outlier behaviors
“Rather than getting wrapped up in prediction or detection organizations
should start first with deterrence.” Patrick Reidy CISO FBI
9
Splunk and the broken window theory
Some employees test the limits of
their access
Employee feedback required for
all unauthorized attempts
(accidental or not).
Splunk monitors access in realtime
Splunk sends email (via script) to
employee indicating awareness of
attempt

10
Examples: Correlations / Detections / Context
Detection

Indicator

Analysis

Printer usage

Number of print jobs over a given period of time

Outlier

Increase in size of print jobs

Outlier

Unusual times of day

Outlier

Rare network printer use (the one not closest
employee

Outlier

Local vs. remote

Outlier

Time of day

Outlier

During vacation times

Outlier

Monitor’s employee behavior and attitude changes
(proxy data)

Outlier/Context

Logins to AD or use of SSO

Abrupt change in the ratio
of website categories
visited

11
Examples: Correlations / Detections / Context
Detection

Indicator

Unused Vacation - 18 months
or longer

Employee remains in control -- work not turned
over to others for review

Context / Lookup

Always first in / first out of the
office

Badge data and/or AD. Desire to control
situation

Context / Lookup

Personal life change – marital
status change stress trigger

Can jeopardize emotional stability – HR system
data

Context / Lookup

Lay-off notification

Monitor for file transfers by individuals that
occur immediately after lay-offs are announced

Context / Lookup

Attempted changes to
document classifications

Document metadata

Direct indicator

Attempts to use USB or CD
Rom

Log data events

Direct indicator
12
Insider Threat Use Case: Disgruntled Employee
Splunk at a Large Aerospace and Defense Contractor
Goal: Protect intellectual property at the hands of disgruntled employee
Use Case Scenario: In an environment where employees are sometimes mis-treated, fired, reprimanded you never know
when an employee has become disgruntle. Think of an employee receiving a "pink slip" and decides before his last day
he wants to take company proprietary data…from SharePoint servers…Below explains how Splunk could be use to
detect/mitigate that type of behavior:
Data Sources: Host based FW logs, Single Sign-on(SSO) logs, SharePoint connection logs,
Content Logic Steps:
1. Upload all employees who received pink slips "login id's" to Splunk' s look-up table
2. Run trending reports on "id's" for the past 6 months
3. Correlate data sources with trend reports
4. Report on suspicious user id's who has increase downloads from SharePoint servers
Splunk Capabilities: lookup, trends, reports, real-time alerts, index, correlation analytics, real-time rules

13
Insider Threat Use Case: Data Leakage/Spill
Splunk at a Large Aerospace and Defense Contractor
Goal: To detect/monitor potential data leakage/spill of very sensitive intellectual property
Use Case Scenario: In an environment where employees are Govt contractors who has access to sensitive R&D projects
and/or supporting Govt programs, data leakage is highly likable. An employee can intentional/unintentional download
any text docs associated to that program/project to personal laptop, personal email, etc. Below explains
Data Sources: Data Loss prevention (DLP) logs, key words, email logs, Anti-virus logs(USB)

Content Logic Steps:
1.Upload "program keywords" and "user ids" in Splunk's lookup table
2. correlate data sources/lookup table
3. Develop/Report on alerts (rule hits)
4. Developed alert visualization & monitor
Data Sources: Data Loss prevention (DLP) logs, key words, email logs, AV,
Splunk Capabilities: lookup, search processing language, real-time alerts, reports, visualization, advance correlation,
real-time rules

14
“Fraud is the daughter of greed.”
― Jonathan Gash, The Great California Game

15
Splunk for Fraud Detection Across Verticals

Financial Services

eCommerce

Mobile / Wireless

Fraud Detections
16

Online Education

“Fraud is the daughter
of greed.”
― Jonathan Gash, The Great
California Game
Online Education Company – Fraud Background
Use Case

Before Splunk

After Splunk

Classroom
activity / fraud
Affects
accreditation

Difficult to identify
fraudulent student loan and
attendance activity
accurately

Complete visibility to classroom
activity and increased confidence
that financial aid fraud is being
detected thoroughly

Seats not taken from legit students
Internet
browsing
history

Bluecoat Reporter had so
Faster and lower cost response to
much data it stopped
internal production requests and
working making them unable data costs
to report on this for HR
17
Online Education Company– Detections Benefits
Use Case

After Splunk

Classroom
activity / fraud
Affects
accreditation

$10s of Millions of fraudulent funds have been stopped from being
distributed

Internet
browsing
history

Saves 75-90% of the Corporate Forensics team’s efforts (can offer more
services)

Reputation and Dept. of Education accreditation maintained seamlessly

Saves $45,000/year in external production services (external Legal)
Saves $1.5M/year in data processing costs (process, collect, cull, review,
etc.)
18
Cash Wire Transfer Company
Subsidiary of Major Financial Institution
With targeted and ever evolving fraud techniques, number of fraud
attempts and amounts rise rapidly, Splunk was introduced to fill a
detection gap in June 2012
• Splunk agility to react to emerging fraud patterns saved millions for
the bank
• Broader view Splunk introduced is able us to quickly identify fraud
techniques, discover and fix design flaws in applications
•

– 11 detection rules deployed
– 2 application flaws were discovered and fixed
Cash Wire Transfer Company - Fraud Detection
12/2012 – 4/15/2013
Payment Amount

Total
Splunk Detected

Attempted

Stopped

Splunk & Other
methods
Splunk Alone
Total

Recovered

Net Loss

$33.5 MM

$27.5 MM

$ 6 MM

$5 MM

$ 15 MM

$13 MM

$ 2 MM

$ 1.7 MM

Recovered
14.41%

Loss
3.62%

$1 MM
$ 0.2 MM

Actual Loss

Attempted
Other Detection
methods

Released

Net Loss

$18,5 MM

$ 1 MM

Stopped
$14 MM
52%

Stopped
Recovered

Recovered
$ 3 MM

$5 MM

$0.2 MM

$ 3.4 MM
12%

$10 MM

$0.00

$ 9.8 MM
36%

$ 0.2 MM

$33.5 MM

$1 MM

$27.5 MM

$ 5 MM

Stopped
81.97%

$ 1.3 MM

• Attempted: payments created or released Stopped: payments didn’t leave the
bank
• Released: payments were out of the bank
• Recovered: payments were recalled back
• Net loss: payments were cashed out

$35,000,000.00
$30,000,000.00
$25,000,000.00
$20,000,000.00
$15,000,000.00
$10,000,000.00
$5,000,000.00
$0.00

Splunk Alone
Splunk & Other
methods
Other Detection
methods
Intuit Financial Services - Fraud Background
•

We noticed a similar fraud
pattern across 15 banks

•

Then we mapped them to see
they were within 15 miles of one
another

•

Fraud was coming from one data
processing vendor who they all
shared

21
Intuit Financial Services Organization -- Wire
Transfers
Watching fraudster in real-time—seeing
$5M, $7M, $8M wire attempts
• Splunk exposed every element of our infrastructure
that he touched
• Next we could correlate activities based on time to
understand his pattern of activity
•

22
Detecting Fraud at Etsy
– Sample patterns of possible fraud:






User traffic coming from “rent a VM”, cloud-based services
Brute force password guessing
Single IP excessively selecting the “I forgot my password” option for several accounts
Abnormally large payments, or very high velocity of payments, from a single account
Customer info that should be stable changing often: email/physical address, payment
card, etc

– Automatically lock accounts that appear to be compromised
– Weave Splunk data into customer service tools so CSRs also see fraud indicators
– Use Splunk for fraud, security, compliance, IT Ops, and app mgmt

2
3
East Coast Financial Services: Use of Splunk for
Fraud Investigations
Phish detection – 500+ customers protected and ~$5M saved
–
–

Used to be done 100% by customers; log files weren’t available for searching for 1 day
Use Splunk to detect the patterns with referrers who are testing their phish to see if it works

Malware detection – 14 detections stopped $140K
–
–

This use case used
data already
indexed in
Splunk…no
incremental cost

Using Splunk to research and detect anomalies within logs specific to malware/web injects
Alert and block the PIN within 10 minutes of identification and before account access

Trading on uncollected funds - ~500 customers protected, stopping over $4.5M
–
–
–

This takes place when a customer places a trade before money transfers in clear
Without Splunk they had to wait a day to get access to this data for analysis
Fastest detection and PIN block was 37 seconds

Online Bank Wire fraud – blocked 60+ incidents saving over $240k
–
–

Transaction completion involves a code sent to a mobile phone, detecting now every 5 minutes
Actually detected an occurrence of this before the capability went live with customers

24
Other Companies

• Using Splunk to track unauthorized cell
phone activations at franchiser locations

Online Ticket
Reseller

• Using web log patterns to determine
fraudulent buyer and sellers

On-Line

25
Other Companies
• Monitoring for anomalous usage patterns
based on plans. An open international call
connection for multiple hours, discovered a
fraud ring selling intl. calling.

On-line
Educational
Institution

• Using Splunk to track academic and financial
aid fraud use weblogs and session IDs.
Students that are flagged come up on a list for
investigation

26
Thank You

More Related Content

PPTX
Data leakage detection
PPTX
Data leakage detection
PPTX
Cybersecurity Awareness for employees.pptx
PPTX
Data leakage detection
PPTX
securityawareness.pptx
PDF
Phishing and prevention
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Bulding Soc In Changing Threat Landscapefinal
Data leakage detection
Data leakage detection
Cybersecurity Awareness for employees.pptx
Data leakage detection
securityawareness.pptx
Phishing and prevention
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Bulding Soc In Changing Threat Landscapefinal

What's hot (19)

PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPT
Prevencion de delitos tecnologicos y ciberbullying
DOC
Jpdcs1 data leakage detection
PPT
პირველი მსოფლიო ომი
PPTX
Phishing
PPTX
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
PPTX
SOC 2 presentation. Overview of SOC 2 assessment
PDF
Threat Hunting with Splunk
PPTX
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
PDF
Employee Security Awareness Program
PPTX
Penetration Testing
PPT
Internet threats and defence mechanism
 
PDF
End-User Security Awareness
PPTX
Splunk for Enterprise Security Featuring UBA
PDF
Ceh v5 module 14 sql injection
PPTX
Social Engineering
PPT
Information security-management-system
PPTX
Phising a Threat to Network Security
Phishing Scams: 8 Helpful Tips to Keep You Safe
Prevencion de delitos tecnologicos y ciberbullying
Jpdcs1 data leakage detection
პირველი მსოფლიო ომი
Phishing
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
SOC 2 presentation. Overview of SOC 2 assessment
Threat Hunting with Splunk
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
Employee Security Awareness Program
Penetration Testing
Internet threats and defence mechanism
 
End-User Security Awareness
Splunk for Enterprise Security Featuring UBA
Ceh v5 module 14 sql injection
Social Engineering
Information security-management-system
Phising a Threat to Network Security
Ad

Viewers also liked (20)

PDF
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
PDF
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
PPTX
Data Mining with Splunk
PDF
SplunkSummit 2015 - Splunk User Behavioral Analytics
PDF
Molina Healthcare Customer Presentation
PPTX
Building an Analytics - Enabled SOC Breakout Session
PPTX
Insider threat event presentation
PDF
Virtual SplunkLive! for Higher Education Overview/Customers
PPT
.conf2011: Web Analytics Throwdown: with NPR and Intuit
PPTX
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
PDF
Splunk | Reporting Use Cases
POTX
Using the Splunk Java SDK
PPTX
Best Practices for a CoE
PPTX
Splunk Dashboarding & Universal Vs. Heavy Forwarders
PPT
Splunk .conf2011: Real Time Alerting and Monitoring
PDF
Splunk conf2014 - Splunk for Data Science
PPT
Making Pretty Charts in Splunk
PPTX
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
PDF
Splunk Enterprise for InfoSec Hands-On
PDF
Threat Hunting
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Data Mining with Splunk
SplunkSummit 2015 - Splunk User Behavioral Analytics
Molina Healthcare Customer Presentation
Building an Analytics - Enabled SOC Breakout Session
Insider threat event presentation
Virtual SplunkLive! for Higher Education Overview/Customers
.conf2011: Web Analytics Throwdown: with NPR and Intuit
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk | Reporting Use Cases
Using the Splunk Java SDK
Best Practices for a CoE
Splunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk .conf2011: Real Time Alerting and Monitoring
Splunk conf2014 - Splunk for Data Science
Making Pretty Charts in Splunk
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Splunk Enterprise for InfoSec Hands-On
Threat Hunting
Ad

Similar to SplunkLive! Splunk for Insider Threats and Fraud Detection (20)

PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PDF
Analytics Driven SIEM Workshop
PDF
Security Breakout Session
PDF
IT Security Presentation - IIMC 2014 Conference
PPTX
SL_Long Beach_Creative Artists_12_04_2015
PDF
Aujas incident management webinar deck 08162016
PPT
Information Leakage - A knowledge Based Approach
PDF
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
PDF
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
PPTX
Splunk for Security Breakout Session
PPTX
Powerpoint v7
PDF
IT Operation Analytic for security- MiSSconf(sp1)
PDF
10 Tips to Strengthen Your Insider Threat Program
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PPTX
SplunkLive! - Splunk for Security
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
Search Inform DLP
PDF
Interset-advanced threat detection wp
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PPTX
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Analytics Driven SIEM Workshop
Security Breakout Session
IT Security Presentation - IIMC 2014 Conference
SL_Long Beach_Creative Artists_12_04_2015
Aujas incident management webinar deck 08162016
Information Leakage - A knowledge Based Approach
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
Splunk for Security Breakout Session
Powerpoint v7
IT Operation Analytic for security- MiSSconf(sp1)
10 Tips to Strengthen Your Insider Threat Program
Technical track chris calvert-1 30 pm-issa conference-calvert
SplunkLive! - Splunk for Security
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Search Inform DLP
Interset-advanced threat detection wp
Virtual Gov Day - Security Breakout - Deloitte
Infosecurity Europe 2016: Operationalizing Threat Intelligence

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction

SplunkLive! Splunk for Insider Threats and Fraud Detection

  • 1. Copyright © 2013 Splunk Inc. Splunk for Insider Threats and Fraud Detection
  • 2. Company Company (NASDAQ: SPLK) Founded 2004, first software release in 2006 HQ: San Francisco / Regional HQ: London, Hong Kong Over 850 employees, based in 12 countries Annual Revenue: $198M (YoY +60%) $5+ billion market valuation Business Model / Products Free download to massive scale On-premise, in the cloud and SaaS 6,000+ Customers; 2500 w/Security Use Cases Customers in over 90 countries 60 of the Fortune 100 Fast Company 2013: Named Splunk #4 Most Innovative Company in the World and #1 Big Data Innovator Largest license: 100 Terabytes per day Leader: Gartner SIEM Magic Quadrant, 2013 2
  • 3. Make machine data accessible, usable and valuable to everyone. 3
  • 4. The Accelerating Pace of Data Volume | Velocity | Variety | Variability GPS, RFID, Hypervisor, data Web Servers, Email, Messaging, Clickstreams, Mobile, Telephony, IVR, Databases, Sensors, Telematics, Storage, Servers, Security Devices, Desktops Machine data is fastest growing, most complex, most valuable area of big 4
  • 5. Machine Generated Data is a Definitive Record of Human-to-Machine and Machineto-Machine Interaction 5
  • 6. Insider Threats – Employee Attitudes 52 • Percent of employees don’t believe it’s a crime to use competitor’s confidential information 44 • Percent believe a software developer who develops source code for a company has some ownership of work and inventions beyond their current employer 42 • Percent don’t think it is a crime to reuse source code with out permission from a former employer, in projects for other companies 60 • Percent say a co-worker hired from a competing company has offered documents from that company for their use Ponemon Institute Survey 2012 6
  • 7. Employee Insider threats Are Authorized users Doing authorized things Have malicious intent A ‘people centric’ behavioral problem Are not Hackers using specialized tools A technical or "cybersecurity" issue alone Escalating their privileges for purposes of espionage
  • 8. Context for Insider Threats • Who are your privileged internal people? • Who might be a likely enemy? • What data that would be at risk? Contextual Cyber Psychological Insider Threat Risk 8
  • 9. Two Strategies for Combating Secondary Detection Primary Prevention/Deterrence • Pattern based • Specific indicators or alerts • Multiple factors • Definitive evidence • Uses heuristics and statistical models • Physical detection (stolen documents) • Requires base lining / watching for outlier behaviors “Rather than getting wrapped up in prediction or detection organizations should start first with deterrence.” Patrick Reidy CISO FBI 9
  • 10. Splunk and the broken window theory Some employees test the limits of their access Employee feedback required for all unauthorized attempts (accidental or not). Splunk monitors access in realtime Splunk sends email (via script) to employee indicating awareness of attempt 10
  • 11. Examples: Correlations / Detections / Context Detection Indicator Analysis Printer usage Number of print jobs over a given period of time Outlier Increase in size of print jobs Outlier Unusual times of day Outlier Rare network printer use (the one not closest employee Outlier Local vs. remote Outlier Time of day Outlier During vacation times Outlier Monitor’s employee behavior and attitude changes (proxy data) Outlier/Context Logins to AD or use of SSO Abrupt change in the ratio of website categories visited 11
  • 12. Examples: Correlations / Detections / Context Detection Indicator Unused Vacation - 18 months or longer Employee remains in control -- work not turned over to others for review Context / Lookup Always first in / first out of the office Badge data and/or AD. Desire to control situation Context / Lookup Personal life change – marital status change stress trigger Can jeopardize emotional stability – HR system data Context / Lookup Lay-off notification Monitor for file transfers by individuals that occur immediately after lay-offs are announced Context / Lookup Attempted changes to document classifications Document metadata Direct indicator Attempts to use USB or CD Rom Log data events Direct indicator 12
  • 13. Insider Threat Use Case: Disgruntled Employee Splunk at a Large Aerospace and Defense Contractor Goal: Protect intellectual property at the hands of disgruntled employee Use Case Scenario: In an environment where employees are sometimes mis-treated, fired, reprimanded you never know when an employee has become disgruntle. Think of an employee receiving a "pink slip" and decides before his last day he wants to take company proprietary data…from SharePoint servers…Below explains how Splunk could be use to detect/mitigate that type of behavior: Data Sources: Host based FW logs, Single Sign-on(SSO) logs, SharePoint connection logs, Content Logic Steps: 1. Upload all employees who received pink slips "login id's" to Splunk' s look-up table 2. Run trending reports on "id's" for the past 6 months 3. Correlate data sources with trend reports 4. Report on suspicious user id's who has increase downloads from SharePoint servers Splunk Capabilities: lookup, trends, reports, real-time alerts, index, correlation analytics, real-time rules 13
  • 14. Insider Threat Use Case: Data Leakage/Spill Splunk at a Large Aerospace and Defense Contractor Goal: To detect/monitor potential data leakage/spill of very sensitive intellectual property Use Case Scenario: In an environment where employees are Govt contractors who has access to sensitive R&D projects and/or supporting Govt programs, data leakage is highly likable. An employee can intentional/unintentional download any text docs associated to that program/project to personal laptop, personal email, etc. Below explains Data Sources: Data Loss prevention (DLP) logs, key words, email logs, Anti-virus logs(USB) Content Logic Steps: 1.Upload "program keywords" and "user ids" in Splunk's lookup table 2. correlate data sources/lookup table 3. Develop/Report on alerts (rule hits) 4. Developed alert visualization & monitor Data Sources: Data Loss prevention (DLP) logs, key words, email logs, AV, Splunk Capabilities: lookup, search processing language, real-time alerts, reports, visualization, advance correlation, real-time rules 14
  • 15. “Fraud is the daughter of greed.” ― Jonathan Gash, The Great California Game 15
  • 16. Splunk for Fraud Detection Across Verticals Financial Services eCommerce Mobile / Wireless Fraud Detections 16 Online Education “Fraud is the daughter of greed.” ― Jonathan Gash, The Great California Game
  • 17. Online Education Company – Fraud Background Use Case Before Splunk After Splunk Classroom activity / fraud Affects accreditation Difficult to identify fraudulent student loan and attendance activity accurately Complete visibility to classroom activity and increased confidence that financial aid fraud is being detected thoroughly Seats not taken from legit students Internet browsing history Bluecoat Reporter had so Faster and lower cost response to much data it stopped internal production requests and working making them unable data costs to report on this for HR 17
  • 18. Online Education Company– Detections Benefits Use Case After Splunk Classroom activity / fraud Affects accreditation $10s of Millions of fraudulent funds have been stopped from being distributed Internet browsing history Saves 75-90% of the Corporate Forensics team’s efforts (can offer more services) Reputation and Dept. of Education accreditation maintained seamlessly Saves $45,000/year in external production services (external Legal) Saves $1.5M/year in data processing costs (process, collect, cull, review, etc.) 18
  • 19. Cash Wire Transfer Company Subsidiary of Major Financial Institution With targeted and ever evolving fraud techniques, number of fraud attempts and amounts rise rapidly, Splunk was introduced to fill a detection gap in June 2012 • Splunk agility to react to emerging fraud patterns saved millions for the bank • Broader view Splunk introduced is able us to quickly identify fraud techniques, discover and fix design flaws in applications • – 11 detection rules deployed – 2 application flaws were discovered and fixed
  • 20. Cash Wire Transfer Company - Fraud Detection 12/2012 – 4/15/2013 Payment Amount Total Splunk Detected Attempted Stopped Splunk & Other methods Splunk Alone Total Recovered Net Loss $33.5 MM $27.5 MM $ 6 MM $5 MM $ 15 MM $13 MM $ 2 MM $ 1.7 MM Recovered 14.41% Loss 3.62% $1 MM $ 0.2 MM Actual Loss Attempted Other Detection methods Released Net Loss $18,5 MM $ 1 MM Stopped $14 MM 52% Stopped Recovered Recovered $ 3 MM $5 MM $0.2 MM $ 3.4 MM 12% $10 MM $0.00 $ 9.8 MM 36% $ 0.2 MM $33.5 MM $1 MM $27.5 MM $ 5 MM Stopped 81.97% $ 1.3 MM • Attempted: payments created or released Stopped: payments didn’t leave the bank • Released: payments were out of the bank • Recovered: payments were recalled back • Net loss: payments were cashed out $35,000,000.00 $30,000,000.00 $25,000,000.00 $20,000,000.00 $15,000,000.00 $10,000,000.00 $5,000,000.00 $0.00 Splunk Alone Splunk & Other methods Other Detection methods
  • 21. Intuit Financial Services - Fraud Background • We noticed a similar fraud pattern across 15 banks • Then we mapped them to see they were within 15 miles of one another • Fraud was coming from one data processing vendor who they all shared 21
  • 22. Intuit Financial Services Organization -- Wire Transfers Watching fraudster in real-time—seeing $5M, $7M, $8M wire attempts • Splunk exposed every element of our infrastructure that he touched • Next we could correlate activities based on time to understand his pattern of activity • 22
  • 23. Detecting Fraud at Etsy – Sample patterns of possible fraud:      User traffic coming from “rent a VM”, cloud-based services Brute force password guessing Single IP excessively selecting the “I forgot my password” option for several accounts Abnormally large payments, or very high velocity of payments, from a single account Customer info that should be stable changing often: email/physical address, payment card, etc – Automatically lock accounts that appear to be compromised – Weave Splunk data into customer service tools so CSRs also see fraud indicators – Use Splunk for fraud, security, compliance, IT Ops, and app mgmt 2 3
  • 24. East Coast Financial Services: Use of Splunk for Fraud Investigations Phish detection – 500+ customers protected and ~$5M saved – – Used to be done 100% by customers; log files weren’t available for searching for 1 day Use Splunk to detect the patterns with referrers who are testing their phish to see if it works Malware detection – 14 detections stopped $140K – – This use case used data already indexed in Splunk…no incremental cost Using Splunk to research and detect anomalies within logs specific to malware/web injects Alert and block the PIN within 10 minutes of identification and before account access Trading on uncollected funds - ~500 customers protected, stopping over $4.5M – – – This takes place when a customer places a trade before money transfers in clear Without Splunk they had to wait a day to get access to this data for analysis Fastest detection and PIN block was 37 seconds Online Bank Wire fraud – blocked 60+ incidents saving over $240k – – Transaction completion involves a code sent to a mobile phone, detecting now every 5 minutes Actually detected an occurrence of this before the capability went live with customers 24
  • 25. Other Companies • Using Splunk to track unauthorized cell phone activations at franchiser locations Online Ticket Reseller • Using web log patterns to determine fraudulent buyer and sellers On-Line 25
  • 26. Other Companies • Monitoring for anomalous usage patterns based on plans. An open international call connection for multiple hours, discovered a fraud ring selling intl. calling. On-line Educational Institution • Using Splunk to track academic and financial aid fraud use weblogs and session IDs. Students that are flagged come up on a list for investigation 26

Editor's Notes

  • #3: Splunk now has more than 850 employees worldwide, with headquarters in San Francisco and 14 offices around the world.Since first shipping its software in 2006, Splunk now has over 6,000 customers in 90+ countries. These organizations are using Splunk software to improve service levels, reduce operations costs, mitigate security risks, enable compliance, enhance DevOps collaboration and create new product and service offerings. Please always refer to latest company data found here: http://www.splunk.com/company.
  • #4: At Splunk, our mission is to make machine data accessible, usable and valuable to everyone. Andthis overarching mission is what drives our company and product priorities.
  • #5: Data is growing and embodies new characteristics not found in traditional structured data:Volume, Velocity, Variety, Variability/Veracity.Machine data is one of the fastest, growing, most complex and most valuable segments of big data.All the webservers, applications, network devices – all of the technology infrastructure running an enterprise or organization – generates massive streams of data, in an array of unpredictable formats that are difficult to process and analyze by traditional methods or in a timely manner. Why is this “machine data” valuable? Because it contains a trace - a categorical record - of user behavior, cyber-security risks, application behavior, service levels, fraudulent activity and customer experience.
  • #7: Ponemon Institute 2012.
  • #8: Patrick Reidy CISO FBI
  • #11: The broken window theory says that if someone breaks a window and they don’t see an indication of notice or any repercussion they determine that no one cares and they’ll likely do it again. It’s the same with access to systems or documents.
  • #20: Bank of America
  • #21: Bank of America
  • #22: Intuit
  • #23: Intuit
  • #24: Etsy, the online marketplace, has spoken at numerous Splunk events around how they use Splunk for fraud detection, security, compliance, and IT operations. Public info is at:http://www.splunk.com/view/SP-CAAAGH3http://codeascraft.com/2013/06/04/leveraging-big-data-to-create-more-secure-web-applications/
  • #25: Fidelity Investments
  • #26: CricketStubhub
  • #27: MetroPCS