SlideShare a Scribd company logo
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Big Data Analytics to
Enhance Security
Anapat Pipatkitibodee
Technical Manager
anapat.p@Stelligence.com
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Agenda
• Big Data Analytics
• Security Trends
• Example Security Attacks
• Integrated Security Analytics with Open Source
• How to Apply ?
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Big Data Analytics
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Everyone is Claiming Big Data
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Traditional vs Big Data
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Drivers of Big Data
• About 80% of the world’s data are semi-structured or unstructured.
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Open Source Tools in Big Data
• Hadoop ecosystem
• NoSQL database
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Apache Hadoop Stack
Reference:
Hadoop Essentials
by Swizec Teller
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
https://whatsthebigdata.com/2016/02/08/big-data-landscape-2016/
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Big Data Analytics
• The process of examining large data sets
containing a variety of data types i.e., big
data.
• Big Data analytics enables organizations to
analyze a mix of structured, semi-structured,
and unstructured data in search of valuable
information and insights.
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Security Trends
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Data Analytics for Intrusion Detection
• 1st generation: Intrusion detection
systems
• 2nd generation: Security information
and event management (SIEM)
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Limitation of Traditional SIEMs
Storing and retaining a large quantity of data was not economically feasible.
Normalization & datastore schema reduces data
Traditional tools did not leverage Big Data technologies.
Closed platform with limited customization & integration options
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Security Trend from Y2015 to Y2016
Fireeye M-Trends Report 2016
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Security Trend from Y2015 to Y2016
• Threats are hard to investigate
Fireeye M-Trends Report 2016
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
All Data is Security Relevant = Big Data
Servers
Storage
DesktopsEmail Web
Transaction
Records
Network
Flows
DHCP/ DNS
Hypervisor
Custom
Apps
Physical
Access
Badges
Threat
Intelligence
Mobile
CMDB
Intrusion
Detection
Firewall
Data Loss
Prevention
Anti-
Malware
Vulnerability
Scans
Traditional
Authentication
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Data Analytics for Intrusion Detection
• 1st generation: Intrusion detection
systems
• 2nd generation: Security information
and event management (SIEM)
• 3rd generation: Big Data analytics in
security (Next generation SIEM)
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Example Security Attacks
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Advanced Persistent Threats
• Advanced
– The attack can cope with traditional security solutions
– In many cases is based on Zero-day vulnerabilities
• Persistent
– Attack has a specific goal
– Remain on the system as long as the attack goal is not met.
• Threat
– Collect and steal information-Confidentiality.
– Make the victim's system unavailable-Availability.
– Modify the victim's system data-Integrity.
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Example of Advanced Threat Activities
HTTP (web) session to
command & control
server
Remote control,
Steal data,
Persist in company,
Rent as botnet
WEB
Conduct
Business
Create additional
environment
Gain Access
to systemTransaction
.pdf
.pdf executes & unpacks malware
overwriting and running ā€œallowedā€ programs
Svchost.exeCalc.exe
Attacker hacks website
Steals .pdf files
Web
Portal.pdf
Attacker creates
malware, embed in .pdf,
Emails
to the target
MAIL
Read email, open attachment
Threat intelligence
Auth - User Roles
Host
Activity/Security
Network
Activity/Security
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Link Events Together
Threat intelligence
Auth - User Roles,
Corp Context
Host
Activity/Security
Network
Activity/Security
WEB
Conduct
Business
Create additional
environment
Gain Access
to systemTransaction
MAIL
.pdf Svchost.exeCalc.exe
Events that
contain link to file
Proxy log
C2 communication
to blacklist
How was
process started?
What created the
program/process?
Process making
C2 traffic
Web
Portal.pdf
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Correlated Security Log
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name:
ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local
Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted:
2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server:
acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3]
[Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]:
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the
computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator
SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts
Sources
All three occurring within a 24-hour period
Source IP
Data Loss
Default Admin Account
Malware Found
Time Range
Intrusion
Detection
Endpoint
Security
Windows
Authentication
Source IP
Source IP
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Incident Analysis & Investigation
Search historically - back in time Watch for new evidence
Related
evidence
from other
security
devices
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Integrated Security Analytics with
Open Source
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
SQRRL Solution
https://sqrrl.com/
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Anomaly detection in Visualizing
https://sqrrl.com/
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Prelert Behavioral Analytics
for the Elastic Stack
http://info.prelert.com/
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Prelert Behavioral Analytics
for the Elastic Stack
http://info.prelert.com/
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
How to Apply ?
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Determining Data That Can Be Collected
Threat
intelligence
Auth - User
Roles
Service
Host
Network
Network Security Through Data Analysisby Michael S
CollinsPublished by O'Reilly Media, Inc., 2014
• Third-party Threat Intel
• Open source blacklist
• Internal threat intelligence
• Firewall
• IDS / IPS
• Web Proxy
• Vulnerability scanners
• VPNs
• Netflow
• TCP Collector
• OS logs
• Patching
• File Integrity
• Endpoint (AV/IPS/FW)
• Malware detection
• Logins, Logouts log
• Active Directory
• LDAP
• AAA, SSO
• Application logs
• Audit log
• Service / Process
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Option 1 : Replace All Solution
• Data sent to new Big Data
Analytic Platform
• Big Data Analytic Platform
– Static Visualizations /
Reports
– Threat detection, alerts,
workflow, compliance
– Incident
investigations/forensics
– Non-security use cases
Big Data Analytic Platform
Raw data
Alerts
Static
Visualizations
Forensics / Search
Interface
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Option 2 : Big Data to Traditional SIEM
• Data sent to both system
• Big Data Analytic Platform
– Incident
investigations/forensics
– Non-security use cases
• Traditional SIEM
– Static Visualizations /
Reports
– Threat detection, alerts,
workflow, compliance
Big Data Analytic
Platform
Raw data
Forensics / Search
Interface
SIEM
Alerts
Static
Visualizations
Connectors
Copyright Stelligence Co.,Ltd. 2016 All rights reserved
Factors for evaluating
Big Data Security Analytics Platforms
Factors for Evaluating Open Source
• Scalable data ingestion HDFS
• Unified data management platform Cassandra / Accumulo
• Support for multiple data types Ready to Customized
• Real time Spark / Strom
• Security analytic tools No
• Compliance reporting No
• Easy to deploy and manage Manage many 3rd Party
• Flexible search, report and create new
correlation rule
No
Copyright Stelligence Co.,Ltd. 2016 All rights reserved

More Related Content

PPTX
Cyber Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PDF
Global Cyber Threat Intelligence
PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Cyber threat intelligence ppt
PPTX
Cyber security: A roadmap to secure solutions
PDF
Threat Hunting
Ā 
Cyber Threat Intelligence
Threat hunting 101 by Sandeep Singh
Global Cyber Threat Intelligence
Cyber Threat Intelligence - It's not just about the feeds
Big Data Analytics for Cyber Security: A Quick Overview
Cyber threat intelligence ppt
Cyber security: A roadmap to secure solutions
Threat Hunting
Ā 

What's hot (20)

PDF
Threat Hunting Procedures and Measurement Matrice
PDF
Threat Intelligence Workshop
PDF
Data Engineering Basics
PDF
Cyber Threat Intelligence
PPT
Artificial Intelligence: Data Mining
PDF
Cybersecurity Skills in Industry 4.0
PPT
Data Classification Presentation
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PDF
Secure Design: Threat Modeling
PDF
Cyber Threat Intelligence
PDF
Red Team Framework
PPTX
Introduction to Data Analytics
PDF
Threat Modeling Using STRIDE
PPTX
Security Operation Center - Design & Build
PPTX
Zero trust Architecture
PPT
Data Protection Presentation
PDF
Security operations center-SOC Presentation-مرکز Ų¹Ł…Ł„ŪŒŲ§ŲŖ Ų§Ł…Ł†ŪŒŲŖ
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
Future of Data Engineering
PPTX
Introduction to Data Engineering
Threat Hunting Procedures and Measurement Matrice
Threat Intelligence Workshop
Data Engineering Basics
Cyber Threat Intelligence
Artificial Intelligence: Data Mining
Cybersecurity Skills in Industry 4.0
Data Classification Presentation
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Secure Design: Threat Modeling
Cyber Threat Intelligence
Red Team Framework
Introduction to Data Analytics
Threat Modeling Using STRIDE
Security Operation Center - Design & Build
Zero trust Architecture
Data Protection Presentation
Security operations center-SOC Presentation-مرکز Ų¹Ł…Ł„ŪŒŲ§ŲŖ Ų§Ł…Ł†ŪŒŲŖ
Cyber Threat Intelligence | Information to Insight
Future of Data Engineering
Introduction to Data Engineering
Ad

Viewers also liked (20)

PDF
Bde presentatie bakker_bart_20170920
PDF
Accenture Big Data Expo
PPTX
Zoomable Menu Mockup
PPTX
Eneco Ronald Root
PPTX
De Bijenkorf Niels Reijmer
PPTX
Technology and AI sharing - From 2016 to Y2017 and Beyond
PDF
Building Blocks Big Data Expo
PDF
Incident response on a shoestring budget
PPTX
Notilyze SAS
PDF
What should I do when my website got hack?
PPTX
Crossyn
PDF
If-If-If-If
PPTX
De groote de man Ingrid de Poorter
PPTX
Bde presentation dv
PPTX
Presentatie big data expo swarovski
PPTX
Dell hans timmerman v1.1
KEY
Java start01 in 2hours
PPT
Polar Bears Mario
PPTX
ProRail Laurens Koppenol & Paul van der Voort
PDF
Google Big Data Expo
Bde presentatie bakker_bart_20170920
Accenture Big Data Expo
Zoomable Menu Mockup
Eneco Ronald Root
De Bijenkorf Niels Reijmer
Technology and AI sharing - From 2016 to Y2017 and Beyond
Building Blocks Big Data Expo
Incident response on a shoestring budget
Notilyze SAS
What should I do when my website got hack?
Crossyn
If-If-If-If
De groote de man Ingrid de Poorter
Bde presentation dv
Presentatie big data expo swarovski
Dell hans timmerman v1.1
Java start01 in 2hours
Polar Bears Mario
ProRail Laurens Koppenol & Paul van der Voort
Google Big Data Expo
Ad

Similar to Big Data Analytics to Enhance Security (20)

PDF
Big Data Analytics to Enhance Security ąø„ąøøąø“ąø­ąø™ąøžąø±ąø—ąø¢ą¹Œ ąøžąø“ąøžąø±ąø’ąø™ą¹Œąøąø“ąø•ąø“ąøšąø”ąøµ Technical Ma...
PDF
PPTX
Splunk for Security Breakout Session
Ā 
PPTX
SplunkLive! - Splunk for Security
Ā 
PPTX
Advanced threat protection and big data
PPTX
Using Big Data to Counteract Advanced Threats
PDF
Big Data Dectives
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PPTX
Operational Security Intelligence
Ā 
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
Ā 
PDF
El contexto de la integración masiva de datos
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
Ā 
PDF
Data Analytics for Security Intelligence
PPTX
SplunkLive! Splunk for Security
Ā 
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Ā 
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Ā 
PDF
Kind of big data in info sec
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PPTX
Splunk for Security-Hands On
Ā 
Big Data Analytics to Enhance Security ąø„ąøøąø“ąø­ąø™ąøžąø±ąø—ąø¢ą¹Œ ąøžąø“ąøžąø±ąø’ąø™ą¹Œąøąø“ąø•ąø“ąøšąø”ąøµ Technical Ma...
Splunk for Security Breakout Session
Ā 
SplunkLive! - Splunk for Security
Ā 
Advanced threat protection and big data
Using Big Data to Counteract Advanced Threats
Big Data Dectives
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Operational Security Intelligence
Ā 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
SplunkLive! Stockholm 2015 breakout - Analytics based security
Ā 
El contexto de la integración masiva de datos
Best Practices for Scoping Infections and Disrupting Breaches
Ā 
Data Analytics for Security Intelligence
SplunkLive! Splunk for Security
Ā 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Ā 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
Ā 
Kind of big data in info sec
[Webinar] Supercharging Security with Behavioral Analytics
Splunk for Security-Hands On
Ā 

More from Data Science Thailand (20)

PDF
Data Science Thailand Meetup#11
PPTX
Define Your Data (Science) Career
PDF
Drawing Your career in business analytics and data science
PPTX
Data Science fuels Creativity
PDF
Microsoft R Server for Data Sciencea
PDF
Electronic Medical Records - Paperless to Big Data Initiative
PDF
Text Mining and Thai NLP
PDF
Machine learning in image processing
PDF
CUSTOMER ANALYTICS & SEGMENTATION FOR CUSTOMER CENTRIC ORGANIZATION & MARKETI...
PDF
Bioinformatics in a Nutshell
PDF
Data Science Application in Business Portfolio & Risk Management
PDF
Myths of Data Science
PDF
Hr Analytics
PDF
Marketing analytics
PDF
Precision Medicine - The Future of Healthcare
PDF
Single Nucleotide Polymorphism Analysis (SNPs)
PDF
Using hadoop for big data
PDF
My Spark Journey
PDF
Technology behind-real-time-log-analytics
PDF
Predictive Analytics in Manufacturing
Data Science Thailand Meetup#11
Define Your Data (Science) Career
Drawing Your career in business analytics and data science
Data Science fuels Creativity
Microsoft R Server for Data Sciencea
Electronic Medical Records - Paperless to Big Data Initiative
Text Mining and Thai NLP
Machine learning in image processing
CUSTOMER ANALYTICS & SEGMENTATION FOR CUSTOMER CENTRIC ORGANIZATION & MARKETI...
Bioinformatics in a Nutshell
Data Science Application in Business Portfolio & Risk Management
Myths of Data Science
Hr Analytics
Marketing analytics
Precision Medicine - The Future of Healthcare
Single Nucleotide Polymorphism Analysis (SNPs)
Using hadoop for big data
My Spark Journey
Technology behind-real-time-log-analytics
Predictive Analytics in Manufacturing

Recently uploaded (20)

PPT
Quality review (1)_presentation of this 21
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
Lecture1 pattern recognition............
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
A Quantitative-WPS Office.pptx research study
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
ā€œGetting Started with Data Analytics Using R – Concepts, Tools & Case Studiesā€
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Mega Projects Data Mega Projects Data
Quality review (1)_presentation of this 21
.pdf is not working space design for the following data for the following dat...
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Lecture1 pattern recognition............
Introduction-to-Cloud-ComputingFinal.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
A Quantitative-WPS Office.pptx research study
climate analysis of Dhaka ,Banglades.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
ā€œGetting Started with Data Analytics Using R – Concepts, Tools & Case Studiesā€
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Mega Projects Data Mega Projects Data

Big Data Analytics to Enhance Security

  • 1. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Big Data Analytics to Enhance Security Anapat Pipatkitibodee Technical Manager anapat.p@Stelligence.com
  • 2. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Agenda • Big Data Analytics • Security Trends • Example Security Attacks • Integrated Security Analytics with Open Source • How to Apply ?
  • 3. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Big Data Analytics
  • 4. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Everyone is Claiming Big Data
  • 5. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Traditional vs Big Data
  • 6. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Drivers of Big Data • About 80% of the world’s data are semi-structured or unstructured.
  • 7. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Open Source Tools in Big Data • Hadoop ecosystem • NoSQL database
  • 8. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Apache Hadoop Stack Reference: Hadoop Essentials by Swizec Teller
  • 9. Copyright Stelligence Co.,Ltd. 2016 All rights reserved https://whatsthebigdata.com/2016/02/08/big-data-landscape-2016/
  • 10. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Big Data Analytics • The process of examining large data sets containing a variety of data types i.e., big data. • Big Data analytics enables organizations to analyze a mix of structured, semi-structured, and unstructured data in search of valuable information and insights.
  • 11. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Security Trends
  • 12. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Data Analytics for Intrusion Detection • 1st generation: Intrusion detection systems • 2nd generation: Security information and event management (SIEM)
  • 13. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Limitation of Traditional SIEMs Storing and retaining a large quantity of data was not economically feasible. Normalization & datastore schema reduces data Traditional tools did not leverage Big Data technologies. Closed platform with limited customization & integration options
  • 14. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Security Trend from Y2015 to Y2016 Fireeye M-Trends Report 2016
  • 15. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Security Trend from Y2015 to Y2016 • Threats are hard to investigate Fireeye M-Trends Report 2016
  • 16. Copyright Stelligence Co.,Ltd. 2016 All rights reserved All Data is Security Relevant = Big Data Servers Storage DesktopsEmail Web Transaction Records Network Flows DHCP/ DNS Hypervisor Custom Apps Physical Access Badges Threat Intelligence Mobile CMDB Intrusion Detection Firewall Data Loss Prevention Anti- Malware Vulnerability Scans Traditional Authentication
  • 17. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Data Analytics for Intrusion Detection • 1st generation: Intrusion detection systems • 2nd generation: Security information and event management (SIEM) • 3rd generation: Big Data analytics in security (Next generation SIEM)
  • 18. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Example Security Attacks
  • 19. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Advanced Persistent Threats • Advanced – The attack can cope with traditional security solutions – In many cases is based on Zero-day vulnerabilities • Persistent – Attack has a specific goal – Remain on the system as long as the attack goal is not met. • Threat – Collect and steal information-Confidentiality. – Make the victim's system unavailable-Availability. – Modify the victim's system data-Integrity.
  • 20. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Example of Advanced Threat Activities HTTP (web) session to command & control server Remote control, Steal data, Persist in company, Rent as botnet WEB Conduct Business Create additional environment Gain Access to systemTransaction .pdf .pdf executes & unpacks malware overwriting and running ā€œallowedā€ programs Svchost.exeCalc.exe Attacker hacks website Steals .pdf files Web Portal.pdf Attacker creates malware, embed in .pdf, Emails to the target MAIL Read email, open attachment Threat intelligence Auth - User Roles Host Activity/Security Network Activity/Security
  • 21. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Link Events Together Threat intelligence Auth - User Roles, Corp Context Host Activity/Security Network Activity/Security WEB Conduct Business Create additional environment Gain Access to systemTransaction MAIL .pdf Svchost.exeCalc.exe Events that contain link to file Proxy log C2 communication to blacklist How was process started? What created the program/process? Process making C2 traffic Web Portal.pdf
  • 22. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Correlated Security Log Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]: 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts Sources All three occurring within a 24-hour period Source IP Data Loss Default Admin Account Malware Found Time Range Intrusion Detection Endpoint Security Windows Authentication Source IP Source IP
  • 23. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Incident Analysis & Investigation Search historically - back in time Watch for new evidence Related evidence from other security devices
  • 24. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Integrated Security Analytics with Open Source
  • 25. Copyright Stelligence Co.,Ltd. 2016 All rights reserved SQRRL Solution https://sqrrl.com/
  • 26. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Anomaly detection in Visualizing https://sqrrl.com/
  • 27. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Prelert Behavioral Analytics for the Elastic Stack http://info.prelert.com/
  • 28. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Prelert Behavioral Analytics for the Elastic Stack http://info.prelert.com/
  • 29. Copyright Stelligence Co.,Ltd. 2016 All rights reserved How to Apply ?
  • 30. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Determining Data That Can Be Collected Threat intelligence Auth - User Roles Service Host Network Network Security Through Data Analysisby Michael S CollinsPublished by O'Reilly Media, Inc., 2014 • Third-party Threat Intel • Open source blacklist • Internal threat intelligence • Firewall • IDS / IPS • Web Proxy • Vulnerability scanners • VPNs • Netflow • TCP Collector • OS logs • Patching • File Integrity • Endpoint (AV/IPS/FW) • Malware detection • Logins, Logouts log • Active Directory • LDAP • AAA, SSO • Application logs • Audit log • Service / Process
  • 31. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Option 1 : Replace All Solution • Data sent to new Big Data Analytic Platform • Big Data Analytic Platform – Static Visualizations / Reports – Threat detection, alerts, workflow, compliance – Incident investigations/forensics – Non-security use cases Big Data Analytic Platform Raw data Alerts Static Visualizations Forensics / Search Interface
  • 32. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Option 2 : Big Data to Traditional SIEM • Data sent to both system • Big Data Analytic Platform – Incident investigations/forensics – Non-security use cases • Traditional SIEM – Static Visualizations / Reports – Threat detection, alerts, workflow, compliance Big Data Analytic Platform Raw data Forensics / Search Interface SIEM Alerts Static Visualizations Connectors
  • 33. Copyright Stelligence Co.,Ltd. 2016 All rights reserved Factors for evaluating Big Data Security Analytics Platforms Factors for Evaluating Open Source • Scalable data ingestion HDFS • Unified data management platform Cassandra / Accumulo • Support for multiple data types Ready to Customized • Real time Spark / Strom • Security analytic tools No • Compliance reporting No • Easy to deploy and manage Manage many 3rd Party • Flexible search, report and create new correlation rule No
  • 34. Copyright Stelligence Co.,Ltd. 2016 All rights reserved