SlideShare a Scribd company logo
Apply Big Data and Data Lake for
processing security data collections
Date: 04.02.2017
Gregory Shlyuger, Ph.D.
Enterprise Technology Architect, Mount Sinai PPS
SPIE Presentation (2017)
Agenda 2
» Cyber Security – Modern Enterprise Thread
» SIEM Conceptual Architecture
» SIEM Implementation – What can go wrong?
» Data Lake / SIEM Integrations
» Apache Metron, Security Data Analytics Platform – Next SIEM Evolution
» Use Case - Adding Squid Proxy Logs to Metron Platform
Cyber Security – Modern Enterprise Thread
62%
Increase in Cyber Security
Breaches since 2013.
3
More than 200 days
Average time an advanced
security breach goes unnoticed.
More than 3 Trillion
Total cost of cyber Security
breaches.
1 in 3
Security professionals are not
familiar with cyber security
threads.
4
In 2005 Mark Nicolett and Amrit
Williams from Gartner introduced
term “Security Information Event
Management” (SIEM).
SIEM = SIM + SEM
5SIEM Conceptual Architecture
Vulnerability Scans
User Information
Asset Information
Threat Intelligence
Contextual Data
Operating Systems
Applications
Devices
Databases
Event Data
SIEM
System Outputs
Analysis, Reports, Real Time Monitoring
System Inputs
Data Connection
Normalization
Aggregation
Correlation
Logic Rules
SIEM Components
1. Data Aggregation:
Log management aggregates data from many sources, including network, security, servers,
databases, applications.
2. Correlation:
Looks for common attributes and links events together into meaningful bundles. This
provides the ability to perform a variety of correlation techniques to integrate different
sources, in order to turn data into useful information.
6
SIEM Components
3. Alerting
The automated analysis of correlated events and production of alerts, to notify recipients of
immediate issues. Alerting can be sent to a dashboard or sent via third party channels such
as email.
4. Dashboards
Tools can take event data and turn it into informational charts to assist in seeing patterns, or
identifying activity that is not forming a standard pattern.
7
SIEM Components
5. Compliance
Applications can be employed to automate the gathering of compliance data, producing
reports that adapt to existing security, governance and auditing processes.
8
SIEM Components
6. Retention
employing long-term storage of historical data to facilitate correlation of data over time, and
to provide the retention necessary for compliance requirements. Long term log data
retention is critical in forensic investigations as it is unlikely that discovery of a network
breach will be at the time of the breach occurring.
7. Forensic analysis
The ability to search across logs on different nodes and time periods based on specific
criteria. This mitigates having to aggregate log information in your head or having to search
through thousands and thousands of logs.
9
SIEM – What Can Be Wrong With Implementation 10
SIEM
1.
Collect
Everything
2.
Poor
Source
Data Health
3.
Over
Complicate
Network
Models
4.
Too Much
Focus on
top 10
5.
Lost in
Compliance
6.
Using a
SIEM as a
log search
tool
1. Collect Everything: Collect with Specific Plan. Grow your capabilities
methodically and according with your plan.
2. Poor Source Data Health – Ensure signature are up-to-date and
configure the way they should be, and timestamp is correct.
3. Overcomplicated Network Model – Start with a simple, high-level
model. Don’t start with thousands of zones. What Is business requirements?
4. Too Much Focus On Top 10 Event – When looking for a bad guy
looking for destruction. When trying to find attacks, you’ll probably never
see in top 10 lists. Bottom 10 list more interesting.
5. Lost In Compliance – Don’t use off shell compliance. The off-the-shell
solution most likely will require customization.
6. Log Search Tool – Don’t chasing events in logs, build/use automatically
monitor for incidents.
Data Lake As SIEM Enhancement
Data Lake IS NOT Replacement for SEIM
SIEM
• Originated from needs to consolidate Security Data.
• SIEM incapable of scaling to loads of IT Big Volume Data.
Data Lake
• Central location where all security data is Collected and Stored.
• Running on commodity hardware.
• Allow effectively applying Machine Learning and Map Reduce.
11
SIEM / Data Lake Integration – Approach 1.
Data source duplicates the
stream to both a SIEM
connector and the Data Lake.
12
Proc
 Easy deployment through a change of
source configuration.
 Data in the data lake is independent of
SIEM, no downstream implications.
 Raw data is preserved.
 Fairly nonintrusive for the infrastructure.
Only source configuration needs to be
changed.
13
Cons
 Data source needs a way to split
data to two destinations.
 Parsing has to be done separately
in the data lake.
 Data in SIEM cannot be linked to
its raw data in the data lake.
SIEM / Data Lake Integration – Approach 1.
SIEM / Data Lake Integration – Approach 2.
Data is sent to a SIEM
connector, which splits the
data to the SIEM and the
Data Lake.
14
Proc
 Data is already parsed when it
gets to the data lake.
 Data in SIEM can be linked to raw
data in the data lake.
15
Cons
 Connector needs a way to split data to
two destinations.
 Need a connector for all data sources.
 SIEM and data lake get the same data.
 To keep raw data, connector needs a
way to forward data in raw format.
 Missing or wrong parsers result in "lost"
data.
SIEM / Data Lake Integration – Approach 2.
SIEM / Data Lake Integration – Approach 3.
Data is first sent into
the Data Lake and
then forwarded via a
SIEM connector to the
SIEM.
16
Proc
 Filtering can be applied to reduce
the load on the SIEM.
 One stream of data consumes
less bandwidth.
 Data in the Data Lake can be
parsed at any time, and parsing
can be updated.
17
Cons
 SIEM connector needs to support data
formats when reading from the Data
Lake.
 Data in the Data Lake needs to be
parsed separately.
SIEM / Data Lake Integration – Approach 3.
SIEM / Data Lake Integration – Approach 4.
Data is picked up by
the SIEM first and then
forwarded on to the
Data Lake.
18
Proc
 All data from the SIEM (including
alerts) can be forwarded to the
Data Lake.
 Parsed data is available in the
Data Lake.
 Existing environment can be
upgraded easily without much
change to the existing setup.
19
Cons
 SIEM needs a way to export the data to a Data
Lake.
 SIEM stays the bottleneck for performance.
 Needs a connector for all data sources.
 SIEM and Data Lake get the same data. No
pre-filtering for SIEM.
 Raw data is hard to preserve.
 Missing or wrong parsers result in "lost" data.
SIEM / Data Lake Integration – Approach 4.
Security Data Analytics
Platform
20Apache Metron – Next SIEM Evolution
2013 - Project Started By Cisco.
2015 - Accepted Into Apache Incubation.
2016 - Apache Metron v 0.1 was release.
2017 - Apache Metron v 0.3.1 was release.
21Use Case – Adding Squid Proxy Log To Metron Platform
ImplementationWhat Is Squid?
Squid is a caching proxy for the Web supporting HTTP, HTTPS,
FTP, and more.
It reduces bandwidth and improves response times by caching and
reusing frequently-requested web pages.
Business Requirements:
Need to add proxy events from Squid logs in real-time to existing
real time security monitoring.
22Use Case – Adding Squid Proxy Log To Metron Platform
Platformmplementation1. Proxy event needs to be enriched so that
the domain names are enriched with the IP.
2. In real-time, the IP within the proxy event
must be checked for threat intel feeds.
3. If there is a threat intel hit, an alert needs to
be raised.
4. The system should provide the ability to
configure rules and prioritize/score different
types of alerts.
The end user must be able to see the
new telemetry events completely
enriched from the new data source.
User should be able to see the alerts
prioritized by the high priority with the
corresponding data.
Be able to deploy a machine learning
model that derives additional insights
from the stream.
*All of these requirements will need to be implemented without writing any new code.
5.
6.
7.
23Implementation Use Case on Apache Metron
24Real-Time Enrichment Telemetry Events - BEFORE
24
When you make an outbound http connection to
https://partner.mountsinai.org from a given host, the following entry
is added to a Squid file called access.log.
4861576382.3812 161 387.8.445.068 TCP_MISS/200 107501 GET
https://partner.mountsinai.org – DIRECT/199.27.74.04 text/html
The domain name of the outbound connection.
Unix Epoch Time. IP of host where connection was made.
25Real-Time Enrichment Telemetry Events - AFTER
25
Magic that Metron will do - telemetry event as it is streamed
through the platform in real-time will be processed.
Convert from Unix Epoch
to Time Stamp.
4861576382.3812 161 387.8.445.068 TCP_MISS/200 107501 GET
https://partner.mountsinai.org – DIRECT/199.27.74.04 text/html
IP of host where connection was made,
Use Metron’s asset enrichment.
Use the Metron’s Threat Intel Services to cross-reference the IP with threat Intel feed.
26
Thank You

More Related Content

PPTX
Apache Metron: Community Driven Cyber Security
PDF
Apache Metron Profiler - Cyber Bootcamp 2017
PPTX
Providence Future of Data Meetup - Apache Metron Open Source Cybersecurity Pl...
PDF
Apache Metron - Profiler
PPTX
Apache metron meetup presentation at capital one
PPSX
Apache metron - An Introduction
PDF
Cybersecurity with Apache Metron and Apache Solr - Ward Bekker, Hortonworks &...
PPTX
A streaming architecture for Cyber Security - Apache Metron
Apache Metron: Community Driven Cyber Security
Apache Metron Profiler - Cyber Bootcamp 2017
Providence Future of Data Meetup - Apache Metron Open Source Cybersecurity Pl...
Apache Metron - Profiler
Apache metron meetup presentation at capital one
Apache metron - An Introduction
Cybersecurity with Apache Metron and Apache Solr - Ward Bekker, Hortonworks &...
A streaming architecture for Cyber Security - Apache Metron

What's hot (20)

PPTX
Solving Cyber at Scale
PDF
Application Programming Interface
PPTX
Treat Detection using Hadoop
PPTX
Splunk Stream - Einblicke in Netzwerk Traffic
PDF
ESM 101 (ESM v6.9.1c)
PDF
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
PPTX
Splunk App for Stream
PDF
6. Kepware_IIoT_Solution
PPTX
Building a future-proof cyber security platform with Apache Metron
PDF
Splunk Enterprise for InfoSec Hands-On Breakout Session
PDF
SplunkLive! München 2016 - Splunk für Security
PPTX
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
PPTX
Adam ochs sentinel
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PDF
PaNDA - a platform for Network Data Analytics: an overview
PDF
Splunk app for stream
PDF
Splunk Live! Utrecht 2016 - CERT EU
PPTX
Getting Started Getting Started With Splunk Enterprise
PDF
Burning Down the Haystack to Find the Needle: Security Analytics in Action
PPTX
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Solving Cyber at Scale
Application Programming Interface
Treat Detection using Hadoop
Splunk Stream - Einblicke in Netzwerk Traffic
ESM 101 (ESM v6.9.1c)
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream
6. Kepware_IIoT_Solution
Building a future-proof cyber security platform with Apache Metron
Splunk Enterprise for InfoSec Hands-On Breakout Session
SplunkLive! München 2016 - Splunk für Security
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Adam ochs sentinel
Hands-On Security Breakout Session- Disrupting the Kill Chain
PaNDA - a platform for Network Data Analytics: an overview
Splunk app for stream
Splunk Live! Utrecht 2016 - CERT EU
Getting Started Getting Started With Splunk Enterprise
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Ad

Similar to Apply big data and data lake for processing security data collections (20)

PPTX
Security Information Event Management Security Information Event Management
PPTX
Introduction to SIEM.pptx
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
Security Information and Event Management (SIEM)
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
PDF
PPTX
RuSIEM overview (english version)
PPTX
McAfee SIEM solution
PPTX
Tips on SIEM Ops 2015
PDF
Softnix Security Data Lake
PPTX
SIEM : Security Information and Event Management
PPTX
Generic siem how_2017
PDF
Understanding Network Insight Integrations to Automate Containment and Kick S...
PPTX
SIEM presentation final
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PDF
SIEM evaluator guide for soc analyst
PPT
MISTI Infosec 2010- SIEM Implementation
PDF
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
PDF
SIEM.pdf
PPTX
Security Information Event Management - nullhyd
Security Information Event Management Security Information Event Management
Introduction to SIEM.pptx
SIEM - Your Complete IT Security Arsenal
Security Information and Event Management (SIEM)
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
RuSIEM overview (english version)
McAfee SIEM solution
Tips on SIEM Ops 2015
Softnix Security Data Lake
SIEM : Security Information and Event Management
Generic siem how_2017
Understanding Network Insight Integrations to Automate Containment and Kick S...
SIEM presentation final
PPT-Splunk-LegacySIEM-101_FINAL
SIEM evaluator guide for soc analyst
MISTI Infosec 2010- SIEM Implementation
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
SIEM.pdf
Security Information Event Management - nullhyd
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)

Apply big data and data lake for processing security data collections

  • 1. Apply Big Data and Data Lake for processing security data collections Date: 04.02.2017 Gregory Shlyuger, Ph.D. Enterprise Technology Architect, Mount Sinai PPS SPIE Presentation (2017)
  • 2. Agenda 2 » Cyber Security – Modern Enterprise Thread » SIEM Conceptual Architecture » SIEM Implementation – What can go wrong? » Data Lake / SIEM Integrations » Apache Metron, Security Data Analytics Platform – Next SIEM Evolution » Use Case - Adding Squid Proxy Logs to Metron Platform
  • 3. Cyber Security – Modern Enterprise Thread 62% Increase in Cyber Security Breaches since 2013. 3 More than 200 days Average time an advanced security breach goes unnoticed. More than 3 Trillion Total cost of cyber Security breaches. 1 in 3 Security professionals are not familiar with cyber security threads.
  • 4. 4 In 2005 Mark Nicolett and Amrit Williams from Gartner introduced term “Security Information Event Management” (SIEM). SIEM = SIM + SEM
  • 5. 5SIEM Conceptual Architecture Vulnerability Scans User Information Asset Information Threat Intelligence Contextual Data Operating Systems Applications Devices Databases Event Data SIEM System Outputs Analysis, Reports, Real Time Monitoring System Inputs Data Connection Normalization Aggregation Correlation Logic Rules
  • 6. SIEM Components 1. Data Aggregation: Log management aggregates data from many sources, including network, security, servers, databases, applications. 2. Correlation: Looks for common attributes and links events together into meaningful bundles. This provides the ability to perform a variety of correlation techniques to integrate different sources, in order to turn data into useful information. 6
  • 7. SIEM Components 3. Alerting The automated analysis of correlated events and production of alerts, to notify recipients of immediate issues. Alerting can be sent to a dashboard or sent via third party channels such as email. 4. Dashboards Tools can take event data and turn it into informational charts to assist in seeing patterns, or identifying activity that is not forming a standard pattern. 7
  • 8. SIEM Components 5. Compliance Applications can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance and auditing processes. 8
  • 9. SIEM Components 6. Retention employing long-term storage of historical data to facilitate correlation of data over time, and to provide the retention necessary for compliance requirements. Long term log data retention is critical in forensic investigations as it is unlikely that discovery of a network breach will be at the time of the breach occurring. 7. Forensic analysis The ability to search across logs on different nodes and time periods based on specific criteria. This mitigates having to aggregate log information in your head or having to search through thousands and thousands of logs. 9
  • 10. SIEM – What Can Be Wrong With Implementation 10 SIEM 1. Collect Everything 2. Poor Source Data Health 3. Over Complicate Network Models 4. Too Much Focus on top 10 5. Lost in Compliance 6. Using a SIEM as a log search tool 1. Collect Everything: Collect with Specific Plan. Grow your capabilities methodically and according with your plan. 2. Poor Source Data Health – Ensure signature are up-to-date and configure the way they should be, and timestamp is correct. 3. Overcomplicated Network Model – Start with a simple, high-level model. Don’t start with thousands of zones. What Is business requirements? 4. Too Much Focus On Top 10 Event – When looking for a bad guy looking for destruction. When trying to find attacks, you’ll probably never see in top 10 lists. Bottom 10 list more interesting. 5. Lost In Compliance – Don’t use off shell compliance. The off-the-shell solution most likely will require customization. 6. Log Search Tool – Don’t chasing events in logs, build/use automatically monitor for incidents.
  • 11. Data Lake As SIEM Enhancement Data Lake IS NOT Replacement for SEIM SIEM • Originated from needs to consolidate Security Data. • SIEM incapable of scaling to loads of IT Big Volume Data. Data Lake • Central location where all security data is Collected and Stored. • Running on commodity hardware. • Allow effectively applying Machine Learning and Map Reduce. 11
  • 12. SIEM / Data Lake Integration – Approach 1. Data source duplicates the stream to both a SIEM connector and the Data Lake. 12
  • 13. Proc  Easy deployment through a change of source configuration.  Data in the data lake is independent of SIEM, no downstream implications.  Raw data is preserved.  Fairly nonintrusive for the infrastructure. Only source configuration needs to be changed. 13 Cons  Data source needs a way to split data to two destinations.  Parsing has to be done separately in the data lake.  Data in SIEM cannot be linked to its raw data in the data lake. SIEM / Data Lake Integration – Approach 1.
  • 14. SIEM / Data Lake Integration – Approach 2. Data is sent to a SIEM connector, which splits the data to the SIEM and the Data Lake. 14
  • 15. Proc  Data is already parsed when it gets to the data lake.  Data in SIEM can be linked to raw data in the data lake. 15 Cons  Connector needs a way to split data to two destinations.  Need a connector for all data sources.  SIEM and data lake get the same data.  To keep raw data, connector needs a way to forward data in raw format.  Missing or wrong parsers result in "lost" data. SIEM / Data Lake Integration – Approach 2.
  • 16. SIEM / Data Lake Integration – Approach 3. Data is first sent into the Data Lake and then forwarded via a SIEM connector to the SIEM. 16
  • 17. Proc  Filtering can be applied to reduce the load on the SIEM.  One stream of data consumes less bandwidth.  Data in the Data Lake can be parsed at any time, and parsing can be updated. 17 Cons  SIEM connector needs to support data formats when reading from the Data Lake.  Data in the Data Lake needs to be parsed separately. SIEM / Data Lake Integration – Approach 3.
  • 18. SIEM / Data Lake Integration – Approach 4. Data is picked up by the SIEM first and then forwarded on to the Data Lake. 18
  • 19. Proc  All data from the SIEM (including alerts) can be forwarded to the Data Lake.  Parsed data is available in the Data Lake.  Existing environment can be upgraded easily without much change to the existing setup. 19 Cons  SIEM needs a way to export the data to a Data Lake.  SIEM stays the bottleneck for performance.  Needs a connector for all data sources.  SIEM and Data Lake get the same data. No pre-filtering for SIEM.  Raw data is hard to preserve.  Missing or wrong parsers result in "lost" data. SIEM / Data Lake Integration – Approach 4.
  • 20. Security Data Analytics Platform 20Apache Metron – Next SIEM Evolution 2013 - Project Started By Cisco. 2015 - Accepted Into Apache Incubation. 2016 - Apache Metron v 0.1 was release. 2017 - Apache Metron v 0.3.1 was release.
  • 21. 21Use Case – Adding Squid Proxy Log To Metron Platform ImplementationWhat Is Squid? Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Business Requirements: Need to add proxy events from Squid logs in real-time to existing real time security monitoring.
  • 22. 22Use Case – Adding Squid Proxy Log To Metron Platform Platformmplementation1. Proxy event needs to be enriched so that the domain names are enriched with the IP. 2. In real-time, the IP within the proxy event must be checked for threat intel feeds. 3. If there is a threat intel hit, an alert needs to be raised. 4. The system should provide the ability to configure rules and prioritize/score different types of alerts. The end user must be able to see the new telemetry events completely enriched from the new data source. User should be able to see the alerts prioritized by the high priority with the corresponding data. Be able to deploy a machine learning model that derives additional insights from the stream. *All of these requirements will need to be implemented without writing any new code. 5. 6. 7.
  • 23. 23Implementation Use Case on Apache Metron
  • 24. 24Real-Time Enrichment Telemetry Events - BEFORE 24 When you make an outbound http connection to https://partner.mountsinai.org from a given host, the following entry is added to a Squid file called access.log. 4861576382.3812 161 387.8.445.068 TCP_MISS/200 107501 GET https://partner.mountsinai.org – DIRECT/199.27.74.04 text/html The domain name of the outbound connection. Unix Epoch Time. IP of host where connection was made.
  • 25. 25Real-Time Enrichment Telemetry Events - AFTER 25 Magic that Metron will do - telemetry event as it is streamed through the platform in real-time will be processed. Convert from Unix Epoch to Time Stamp. 4861576382.3812 161 387.8.445.068 TCP_MISS/200 107501 GET https://partner.mountsinai.org – DIRECT/199.27.74.04 text/html IP of host where connection was made, Use Metron’s asset enrichment. Use the Metron’s Threat Intel Services to cross-reference the IP with threat Intel feed.