SlideShare a Scribd company logo
Investigation
Theory
A Cognitive Approach
Chris Sanders
Chris Sanders (@chrissanders88)
 Analyst @ FireEye
 Founder @ Rural Tech
Fund
 PhD Researcher
 GSE # 64
 BBQ Pit Master
 Author:
 Practical Packet Analysis
 Applied NSM
 Investigation Theory
Course
Symptoms of a Cognitive Crisis
1. Demand for expertise greatly outweights
supply
2. Most information cannot be trusted or
validated
3. Inability to mobilize and tackle big systemic
issues
Ethnography of the SOC
“An analyst’s job is highly
dynamic and requires dealing
with constantly evolving threats.
Doing the job is more art than
science. Ad hoc, on-the-job
training for new analysts is the
norm."
Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to
studying CSIRTs. Network, 100, 2.
Ethnography of the SOC
“The profession [security] is so
nascent that the how-tos have
not been fully realized even by
the people who have the
knowledge…the process
required to connect the dots is
unclear even to analysts.
Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to
studying CSIRTs. Network, 100, 2.
Symptoms of a Cognitive Crisis
1. Demand for expertise greatly outweights
supply
2. Most information cannot be trusted or
validated
3. Inability to mobilize and tackle big systemic
issues
The Cognitive Revolution
1. Understand the
processes used to draw
conclusions
2. Develop repeatable
methods and techniques
3. Build and advocate
training that teaches
practitioners how to
think
What
separates
novice and
expert
analysts?
Mapping the Investigation
 Sample:
 Novice and expert analysts
 Methodology:
 30+ case studies
 Stimulated recall interviews
 Focus on individual investigations of varying
types
 Perform key phrase analysis – analyze results
Key Phrase Mapping
 Dual Process Theory
 Intuition: Implicit, unconscious, fast
 Reflection: Explicit, controlled, slow
Intuition
Experimentation
Restructuring
Imagination
Incubation
Metacognition
Evaluation
Goal Setting
Making Plans
Reflection
Analytically Viewing
Data
Rule-Based
Reasoning
Considering
Alternatives
Results
Novices Experts
Intuition Metacognition Reflection
Analyzing the
Flow of the
Investigation
Investigations as Mental
Labyrinths
 The investigation is
the core construct of
information security.
 How do we study
them when everyone
has a different
toolset?
 Follow the Data!
Alert
OSINT
Reputation
File Hash
Sandbox
Behaviors
AV Detections
(VT)
Imphash
More File
Hashes
Friendly Host
Network PCAP
Host
Windows
Logs
Security Log
System Log
App LogRegistry
File System
Hostile Host Network
PCAP
Flow
Studying the Investigation
Process
Studying the Investigation
Process
What data did analysts look at
first?
72%
16%
12%
Observed
PCAP Flow OSINT
Data Suggests:
 Analysts prefer a higher context data set…
 …even if other data sets are available
 …even if lower context data sets can lead to a
resolution.
Did the first move affect analysis
speed?
Data Suggests:
 While PCAP provides richer context, it may slow down
the investigation if that’s where you start
 Starting with a lower context data source can increase
speed when working with higher context data
16
10
9
PCAP Flow OSINT
Avg Time to Close
What happens when Bro data
replaces PCAP?
46%
25%
29%
Observed (Bro)
Bro Flow OSINT
72%
16%
12%
Observed (PCAP)
PCAP Flow OSINT
What happens when Bro data
replaces PCAP?
16
10
9
PCAP Flow OSINT
Avg Time to Close (PCAP)
10 10 11
Bro Flow OSINT
Avg Time to Close (Bro)
Data Suggests:
 Better organization of high context data sources
can yield improvements in analysts performance
What data sources were viewed
most and least frequently?
Data Suggests:
 Network data is used more frequently than host data…
 …even when host data can be used exclusively to resolve.
 …even when easy access is provided to host sources.
 Revisting data is more prevalent on higher context data
sources
Data Sources Viewed Data Sources Revisited
PCA
P
84%
Flow
11%
OSIN
T
5%
How many steps were taken to
make a disposition judgement?
Data Suggests:
 At some point, the number of data sources you
investigate impacts the speed of the investigation
 Understanding where data exists and when to use it
can impact analysis speed
6
12
9
3
0
5
10
15
6-10 11-15 16-20 21-25
Number of Steps
9
12
14
24
0
5
10
15
20
25
30
6-10 11-15 16-20 21-25
Avg Time to Close
Did analysts investigate friendly or
hostile systems first?
9%
91%
Observed
Friendly Hostile
Data Suggests:
 Analysts are more compelled to investigate unknown external
threats than internal systems
 Analysts don’t fully understand their own techniques
41%
59%
Friendly
Friendly Hostile
Thank You!
Mail: chris@chrissanders.org
Twitter: @chrissanders88
Blog: chrissanders.org
Training: chrissanders.org/training

More Related Content

PPTX
Threats that Matter - Murray State University 2017
PPTX
Abstract Tools for Effective Threat Hunting
PPTX
SOC2016 - The Investigation Labyrinth
PDF
Building a Threat Hunting Practice in the Cloud
PPTX
BSA2016 - Honeypots for Network Security Monitoring
PDF
Threat Hunting 102: Beyond the Basics
PPTX
Building a Successful Threat Hunting Program
PDF
Threat Hunting
Threats that Matter - Murray State University 2017
Abstract Tools for Effective Threat Hunting
SOC2016 - The Investigation Labyrinth
Building a Threat Hunting Practice in the Cloud
BSA2016 - Honeypots for Network Security Monitoring
Threat Hunting 102: Beyond the Basics
Building a Successful Threat Hunting Program
Threat Hunting

What's hot (20)

PPTX
Minding the Metacognitive Gap - BSides NOLA
PDF
Enabling effective hunt teaming and incident response
PDF
See Clearly and Respond Quickly from the Network to the Endpoint
PDF
Threat Hunting Report
PPTX
Cyber Threat Hunting with Phirelight
PDF
Threat Hunting with Splunk Hands-on
PDF
Managing Indicator Deprecation in ThreatConnect
PPTX
Threat Hunting with Splunk
PPTX
Threat Hunting with Splunk Hands-on
PPTX
Episode IV: A New Scope
PPTX
Threat hunting - Every day is hunting season
PDF
Threat Hunting Workshop
PDF
(SACON) Shomiron das gupta - threat hunting use cases
PPTX
Advanced Threat Hunting - Botconf 2017
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PDF
Threat Hunting Procedures and Measurement Matrice
PDF
Threat Hunting with Splunk
PDF
Threat Hunting with Data Science
PPTX
Threat hunting and achieving security maturity
PDF
Intelligence driven defense webinar
Minding the Metacognitive Gap - BSides NOLA
Enabling effective hunt teaming and incident response
See Clearly and Respond Quickly from the Network to the Endpoint
Threat Hunting Report
Cyber Threat Hunting with Phirelight
Threat Hunting with Splunk Hands-on
Managing Indicator Deprecation in ThreatConnect
Threat Hunting with Splunk
Threat Hunting with Splunk Hands-on
Episode IV: A New Scope
Threat hunting - Every day is hunting season
Threat Hunting Workshop
(SACON) Shomiron das gupta - threat hunting use cases
Advanced Threat Hunting - Botconf 2017
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
Threat Hunting Procedures and Measurement Matrice
Threat Hunting with Splunk
Threat Hunting with Data Science
Threat hunting and achieving security maturity
Intelligence driven defense webinar
Ad

Viewers also liked (20)

PPTX
Applied Detection and Analysis Using Flow Data - MIRCon 2014
PPT
Using Canary Honeypots for Network Security Monitoring
PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
PPT
Developing Analytic Technique and Defeating Cognitive Bias in Security
PDF
Windows Threat Hunting
PDF
Threat Hunting with Splunk
PPTX
Splunk for Developers Breakout Session
PPTX
Splunk for Security - Hands-On
PDF
Web Application Security 101 - 12 Logging
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PDF
Cognitive approach & therapies
PDF
Workshop threat-hunting
PPT
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
PPTX
Docker Indy Meetup Monitoring 30-Aug-2016
PPTX
Cronograma de actividades 8°- 1er periodo 2017(corregido)
PPTX
Elastic - ELK, Logstash & Kibana
PPTX
Threat Hunting with Splunk
PPTX
SNMP Demystified Part-I
PDF
Real-time data analysis using ELK
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Using Canary Honeypots for Network Security Monitoring
Applied Detection and Analysis with Flow Data - SO Con 2014
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
Developing Analytic Technique and Defeating Cognitive Bias in Security
Windows Threat Hunting
Threat Hunting with Splunk
Splunk for Developers Breakout Session
Splunk for Security - Hands-On
Web Application Security 101 - 12 Logging
09 application security fundamentals - part 2 - security mechanisms - logging
Cognitive approach & therapies
Workshop threat-hunting
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
Docker Indy Meetup Monitoring 30-Aug-2016
Cronograma de actividades 8°- 1er periodo 2017(corregido)
Elastic - ELK, Logstash & Kibana
Threat Hunting with Splunk
SNMP Demystified Part-I
Real-time data analysis using ELK
Ad

Similar to Art into Science 2017 - Investigation Theory: A Cognitive Approach (20)

DOCX
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PPTX
Network security situational awareness
ODP
Unlock Security Insight from Machine Data
PDF
Key Investigation Aspects for Information Security
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
CNIT 50: 9. NSM Operations
PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
PPTX
Threats Intelligence and analysis . pptx
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PDF
Data Analytics in Cyber Security - Intellisys 2015 Keynote
PDF
Huntsman - Threat intelligence (for IAP2015)
PPT
2004 05 intelligence processing seminar
PDF
To situation awareness theory
PDF
Using Predictive Analytics for Anticipatory Investigation and Intervention
PDF
The Art and Science of Alert Triage
PPTX
Putting the Human Back in the Loop for Analysis
PDF
Road map for actionable threat intelligence
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Security Analytics for Data Discovery - Closing the SIEM Gap
Network security situational awareness
Unlock Security Insight from Machine Data
Key Investigation Aspects for Information Security
Technical track chris calvert-1 30 pm-issa conference-calvert
CNIT 50: 9. NSM Operations
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Threats Intelligence and analysis . pptx
[Bucharest] Attack is easy, let's talk defence
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Huntsman - Threat intelligence (for IAP2015)
2004 05 intelligence processing seminar
To situation awareness theory
Using Predictive Analytics for Anticipatory Investigation and Intervention
The Art and Science of Alert Triage
Putting the Human Back in the Loop for Analysis
Road map for actionable threat intelligence

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf

Art into Science 2017 - Investigation Theory: A Cognitive Approach

  • 2. Chris Sanders (@chrissanders88)  Analyst @ FireEye  Founder @ Rural Tech Fund  PhD Researcher  GSE # 64  BBQ Pit Master  Author:  Practical Packet Analysis  Applied NSM  Investigation Theory Course
  • 3. Symptoms of a Cognitive Crisis 1. Demand for expertise greatly outweights supply 2. Most information cannot be trusted or validated 3. Inability to mobilize and tackle big systemic issues
  • 4. Ethnography of the SOC “An analyst’s job is highly dynamic and requires dealing with constantly evolving threats. Doing the job is more art than science. Ad hoc, on-the-job training for new analysts is the norm." Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to studying CSIRTs. Network, 100, 2.
  • 5. Ethnography of the SOC “The profession [security] is so nascent that the how-tos have not been fully realized even by the people who have the knowledge…the process required to connect the dots is unclear even to analysts. Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to studying CSIRTs. Network, 100, 2.
  • 6. Symptoms of a Cognitive Crisis 1. Demand for expertise greatly outweights supply 2. Most information cannot be trusted or validated 3. Inability to mobilize and tackle big systemic issues
  • 7. The Cognitive Revolution 1. Understand the processes used to draw conclusions 2. Develop repeatable methods and techniques 3. Build and advocate training that teaches practitioners how to think
  • 9. Mapping the Investigation  Sample:  Novice and expert analysts  Methodology:  30+ case studies  Stimulated recall interviews  Focus on individual investigations of varying types  Perform key phrase analysis – analyze results
  • 10. Key Phrase Mapping  Dual Process Theory  Intuition: Implicit, unconscious, fast  Reflection: Explicit, controlled, slow Intuition Experimentation Restructuring Imagination Incubation Metacognition Evaluation Goal Setting Making Plans Reflection Analytically Viewing Data Rule-Based Reasoning Considering Alternatives
  • 12. Analyzing the Flow of the Investigation
  • 13. Investigations as Mental Labyrinths  The investigation is the core construct of information security.  How do we study them when everyone has a different toolset?  Follow the Data! Alert OSINT Reputation File Hash Sandbox Behaviors AV Detections (VT) Imphash More File Hashes Friendly Host Network PCAP Host Windows Logs Security Log System Log App LogRegistry File System Hostile Host Network PCAP Flow
  • 16. What data did analysts look at first? 72% 16% 12% Observed PCAP Flow OSINT Data Suggests:  Analysts prefer a higher context data set…  …even if other data sets are available  …even if lower context data sets can lead to a resolution.
  • 17. Did the first move affect analysis speed? Data Suggests:  While PCAP provides richer context, it may slow down the investigation if that’s where you start  Starting with a lower context data source can increase speed when working with higher context data 16 10 9 PCAP Flow OSINT Avg Time to Close
  • 18. What happens when Bro data replaces PCAP? 46% 25% 29% Observed (Bro) Bro Flow OSINT 72% 16% 12% Observed (PCAP) PCAP Flow OSINT
  • 19. What happens when Bro data replaces PCAP? 16 10 9 PCAP Flow OSINT Avg Time to Close (PCAP) 10 10 11 Bro Flow OSINT Avg Time to Close (Bro) Data Suggests:  Better organization of high context data sources can yield improvements in analysts performance
  • 20. What data sources were viewed most and least frequently? Data Suggests:  Network data is used more frequently than host data…  …even when host data can be used exclusively to resolve.  …even when easy access is provided to host sources.  Revisting data is more prevalent on higher context data sources Data Sources Viewed Data Sources Revisited PCA P 84% Flow 11% OSIN T 5%
  • 21. How many steps were taken to make a disposition judgement? Data Suggests:  At some point, the number of data sources you investigate impacts the speed of the investigation  Understanding where data exists and when to use it can impact analysis speed 6 12 9 3 0 5 10 15 6-10 11-15 16-20 21-25 Number of Steps 9 12 14 24 0 5 10 15 20 25 30 6-10 11-15 16-20 21-25 Avg Time to Close
  • 22. Did analysts investigate friendly or hostile systems first? 9% 91% Observed Friendly Hostile Data Suggests:  Analysts are more compelled to investigate unknown external threats than internal systems  Analysts don’t fully understand their own techniques 41% 59% Friendly Friendly Hostile
  • 23. Thank You! Mail: chris@chrissanders.org Twitter: @chrissanders88 Blog: chrissanders.org Training: chrissanders.org/training

Editor's Notes

  • #4: Every town had one doctor and they were also your vet Many home remedies spawn from this time – milk as a treatment for stomach ulcers is an example Major health crises were frequent and impossible to control
  • #5: Anthroplogists Ethnography
  • #6: Is this an individual thing, or is it a systemic problem?
  • #7: Every town had one doctor and they were also your vet Many home remedies spawn from this time – milk as a treatment for stomach ulcers is an example Major health crises were frequent and impossible to control
  • #15: We ended up with an investigation game
  • #17: Sidebar: Analysts looked at the PCAP 100% of the time, even if it wasn’t necessary.
  • #21: This points to tendencies gained from training. Most shops don’t have easy access to host data.
  • #22: Anecdotal – Experts I knew took less than 10 steps. Anecdotal – Novices I knew took > 15.