SlideShare a Scribd company logo
USER
BEHAVIOURAL
ANALYTICS
Machine Learning for Threat Detection
Harry McLaren – Security Consultant at ECS
HARRY MCLAREN
•Alumnus of Edinburgh Napier
•Security Consultant at ECS
• SOC & CSIR Development
• Splunk Consultant & Architect
ACCELERATING PACE OF DATA
Volume | Velocity | Variety | Variability
Legacy SIEM type technologies aren’t
enough to detect insider threats and
advanced adversaries and are poorly
designed for rapid incident response.
[SIEM - Security Information & Event Management]
Inadequate
Contextual Data
68% of respondents in the
survey said that reports
often only indicated
changes without specifying
what the change was.
Innocuous
Events of Interest
81% of respondents said
that SIEM reports contain
too much extraneous
information and were
overwhelmed with
false positives.
2016 SIEM Efficiency Survey - Conducted by Netwrix
1995
2002
2008
2011
2015
END-POINT SECURITY NETWORK SECURITY EARLY CORRELATION PAYLOAD ANALYSIS BEHAVIOR ANALYSIS
TECHNOLOGY
DEVELOPMENT
CAPABILITY
EVOLUTION
KILL CHAIN - EVENTS OVERLOAD
SECURITY PLATFORM
DETECTING
UNKNOWN THREATS
SECURITY &
COMPLIANCE
REPORTING
INCIDENT
INVESTIGATIONS &
FORENSICS
REAL-TIME
MONITORING OF
KNOWN THREATS
DETECTION OF INSIDER
THREATS
DETECTION OF
ADVANCED
CYBER ATTACKS
Splunk Enterprise Security Splunk UBA
MACHINE LEARNING
EVOLUTION
EVOLUTION
COMPLEXITY
RULES - THRESHOLD
POLICY - THRESHOLD
POLICY - STATISTICS
UNSUPERVISED MACHINE
LEARNING
POLICY - PEER GROUP
STATISTICS
SUPERVISED MACHINE
LEARNING
DETECT ADVANCED CYBERATTACKS
DETECT MALICIOUS INSIDER THREATS
ANOMALY
DETECTION
THREAT
DETECTION
UNSUPERVISED
MACHINE
LEARNING
BEHAVIOR
BASELINING &
MODELING
REAL-TIME &
BIG DATA
ARCHITECTURE
WHAT IS SPLUNK
USER BEHAVIORAL ANALYTICS?
INSIDER
THREAT
John connects via VPN
Administrator performs ssh (root) to a file share -
finance department
John executes remote desktop to a system
(administrator) - PCI zone
John elevates his privileges
root copies the document to another file share -
Corporate zone
root accesses a sensitive document
from the file share
root uses a set of Twitter handles to chop and copy
the data outside the enterprise
USER ACTIVITY
Day 1
.
.
Day 2
.
.
Day N
MULTI-ENTITY BEHAVIORAL MODEL
APPLICATION
USER
HOST
NETWORK
DATA
Machine Learning for Threat Detection
UBA 2.2 LATEST FEATURES
• Threat Modeling Framework
• Create custom threats using 60+ anomalies.
• Enhanced Security Analytics
• Visibility and baseline metrics around user,
device, application and protocols.
• Risk Percentile & Dynamic Peer Groups
• Support for Additional 3rd Party Devices
QUESTIONS / CONTACT
twitter.com/cyberharibu
harry.mclaren@ecs.co.uk
harrymclaren.co.uk/blog
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection
Machine Learning for Threat Detection

More Related Content

PDF
Threat Hunting
PPTX
Security Information and Event Management (SIEM)
PPT
Malware Detection using Machine Learning
PDF
MITRE ATT&CK Framework
PPTX
Putting MITRE ATT&CK into Action with What You Have, Where You Are
PDF
IBM QRadar Security Intelligence Overview
PPTX
Application of Machine Learning in Cybersecurity
PDF
Overview of the Cyber Kill Chain [TM]
Threat Hunting
Security Information and Event Management (SIEM)
Malware Detection using Machine Learning
MITRE ATT&CK Framework
Putting MITRE ATT&CK into Action with What You Have, Where You Are
IBM QRadar Security Intelligence Overview
Application of Machine Learning in Cybersecurity
Overview of the Cyber Kill Chain [TM]

What's hot (20)

PPT
Introduction To OWASP
PDF
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
PPTX
Zero trust Architecture
PPTX
Machine learning in Cyber Security
PPTX
Open source SOC Tools for Home-Lab
PDF
The Importance of Cybersecurity for Digital Transformation
PPTX
Cryptography and Information Security
PPTX
MITRE ATT&CK framework
PDF
Network Security Presentation
PDF
"CERT Secure Coding Standards" by Dr. Mark Sherman
PPTX
Network security - Defense in Depth
PDF
SIEM Architecture
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
What is SIEM
PPT
PPTX
Exploitation techniques and fuzzing
PDF
Introduction to QRadar
PDF
Detecting fraud with Python and machine learning
PDF
Incident response methodology
PDF
Navigating Zero Trust Presentation Slides
Introduction To OWASP
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
Zero trust Architecture
Machine learning in Cyber Security
Open source SOC Tools for Home-Lab
The Importance of Cybersecurity for Digital Transformation
Cryptography and Information Security
MITRE ATT&CK framework
Network Security Presentation
"CERT Secure Coding Standards" by Dr. Mark Sherman
Network security - Defense in Depth
SIEM Architecture
PHDays 2018 Threat Hunting Hands-On Lab
What is SIEM
Exploitation techniques and fuzzing
Introduction to QRadar
Detecting fraud with Python and machine learning
Incident response methodology
Navigating Zero Trust Presentation Slides
Ad

Viewers also liked (20)

PPTX
When Cyber Security Meets Machine Learning
PDF
Computer security - A machine learning approach
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PDF
Jim Geovedi - Machine Learning for Cybersecurity
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PDF
BSidesLV 2013 - Using Machine Learning to Support Information Security
PDF
Artificial Intelligence and Machine Learning for Cybersecurity
PPTX
A review of machine learning based anomaly detection
PPTX
Machine Learning in Information Security by Mohammed Zuber
PPT
Fms goodreads
PDF
Kind of big data in info sec
PPTX
MOBILE DEVICE FORENSICS USING NLP
PPTX
Cloudera Federal Forum 2014: The Evolution of Machine Learning from Science t...
PPTX
Machine learning cyphort_malware_most_wanted
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
KEY
SXSW
PPTX
Artificial intelligence in cyber defense
PDF
Next generation security analytics
PDF
Data Science Transforming Security Operations
PPTX
Detecting Hacks: Anomaly Detection on Networking Data
When Cyber Security Meets Machine Learning
Computer security - A machine learning approach
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Jim Geovedi - Machine Learning for Cybersecurity
Using Machine Learning in Networks Intrusion Detection Systems
BSidesLV 2013 - Using Machine Learning to Support Information Security
Artificial Intelligence and Machine Learning for Cybersecurity
A review of machine learning based anomaly detection
Machine Learning in Information Security by Mohammed Zuber
Fms goodreads
Kind of big data in info sec
MOBILE DEVICE FORENSICS USING NLP
Cloudera Federal Forum 2014: The Evolution of Machine Learning from Science t...
Machine learning cyphort_malware_most_wanted
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
SXSW
Artificial intelligence in cyber defense
Next generation security analytics
Data Science Transforming Security Operations
Detecting Hacks: Anomaly Detection on Networking Data
Ad

Similar to Machine Learning for Threat Detection (20)

PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Splunk for Enterprise Security Featuring UBA
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PDF
Enterprise Security featuring UBA
PPTX
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
PPTX
Big Data For Threat Detection & Response
PPTX
Splunk User Group Edinburgh - November Event
PPTX
SplunkLive! - Splunk for Security
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Enterprise Sec + User Bahavior Analytics
PPTX
Splunk for Security Breakout Session
PPTX
Enterprise Security and User Behavior Analytics
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security featuring UBA Breakout Session
Enterprise Security featuring UBA
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
Big Data For Threat Detection & Response
Splunk User Group Edinburgh - November Event
SplunkLive! - Splunk for Security
Splunk for Enterprise Security featuring User Behavior Analytics
Enterprise Sec + User Bahavior Analytics
Splunk for Security Breakout Session
Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring UBA

More from Napier University (20)

PDF
Intrusion Detection Systems
PPTX
PPTX
Memory, Big Data and SIEM
PPTX
What is Cyber Data?
PPTX
Open Source Intelligence
PDF
10. Data to Information: NumPy and Pandas
PDF
2. Defence Systems
PDF
1. Cyber and Intelligence
PPTX
The Road Ahead for Ripple, Marjan Delatinne
PDF
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
PPTX
ARTiFACTS, Emma Boswood
PPTX
RMIT Blockchain Innovation Hub, Chris Berg
PPTX
Keynote, Naseem Naqvi
PPT
Browser-based Crypto M, C. F Mondschein
PPTX
Should we transform or adapt to blockchain - a public sector perspective?, Al...
PPTX
IoT device attestation system using blockchain, Alistair Duke
PPTX
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
PDF
Using Blockchain for Evidence Purpose, Rafael Prabucki
PPTX
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
PPTX
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Intrusion Detection Systems
Memory, Big Data and SIEM
What is Cyber Data?
Open Source Intelligence
10. Data to Information: NumPy and Pandas
2. Defence Systems
1. Cyber and Intelligence
The Road Ahead for Ripple, Marjan Delatinne
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
ARTiFACTS, Emma Boswood
RMIT Blockchain Innovation Hub, Chris Berg
Keynote, Naseem Naqvi
Browser-based Crypto M, C. F Mondschein
Should we transform or adapt to blockchain - a public sector perspective?, Al...
IoT device attestation system using blockchain, Alistair Duke
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Using Blockchain for Evidence Purpose, Rafael Prabucki
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars

Machine Learning for Threat Detection

Editor's Notes

  • #2: Slide: Title
  • #3: Slide: Introduction
  • #4: Slide: Machine Data
  • #5: Slide: Problem – Legacy SIEM
  • #6: Slide: Evidence The same survey showed that over half of the respondents are trying to employ more entry level analysts to deal with the overwhelming (but largely worthless) alerts coming from their legacy SIEMs and further more turning to audits and compliance activities to overcome the SIEMs drawbacks. Sources: http://www.bloomberg.com/research/markets/news/article.asp?docKey=600-201603150921MRKTWIREUSPR_____1249121-1 http://www.information-age.com/technology/information-management/123461162/why-big-data-and-siem-dont-always-equal-big-answers-security
  • #7: Slide: Technology Development
  • #8: Slide: Events Overload
  • #9: Slide: Splunk Security Platform
  • #10: Slide: Machine Learning Evolution
  • #11: Slide: Solution – Splunk UBA Splunk User Behavior Analytics is a cyber security and threat detection solution that helps organizations find hidden threats without using rules, signatures or human analysis. It uses behavior modeling, peer group analysis, real-time statistical analysis, collaborative filtering and other machine learning techniques. Has a 99% reduction of notable events in various customer based case studies, enabling analysts to focus on important threats and not waste time confirming false positives. Attack Defenses User & Entity Behavior Baseline Behavioral Peer Group Analysis Insider Threat Detection IP Reputation Analysis Reconnaissance, Botnet and C&C Analysis Statistical Analysis Data Exfiltration Models Lateral Movement Analysis Polymorphic Attack Analysis Cyber Attack / External Threat Detection Entropy/Rare Event Detection User/Device Dynamic Fingerprinting Threat Attack Correlation Data Sources Key: Identity/Authentication Active Directory/Domain Controller Single Sign-on HRIS VPN DNS, DHCP Activity Web Gateway Proxy Server Firewall DLP Security Products Malware Endpoint IDS, IPS, AV Optional: SaaS/Mobile AWS CloudTrail Box, SF.com, Dropbox, other SaaS apps Mobile Devices External Threat Feeds Threat Stream, FS-ISAC or other blacklists for IPs/domains
  • #12: Slide: Example – Insider Threat
  • #13: Slide: Behaviour Modelling Categories Deviation from Baseline Time series Rarity, probabilistic difference Rare sequences Outliers Advanced Behaviour Detection Beaconing Exploit kit Malware for HTTP Malware for IP Webshell Graph Models Lateral movement Resource Access Helper Models Anomalies based on rules Externals alarms handlers Session Building Connection between events Track activity from different perspectives in a kill chain Threat Models Graph-based models Session-based models Rule-based models
  • #14: Demo