SlideShare a Scribd company logo
Big data … for security
James Salter
Hewlett Packard Labs
December 3, 2015
This is what we are dealing with...
2
6
Next generation
data centres
300K+
Employees and
contractors
A massive IT
operation
41K+
servers
440K+
PCs deployed
15K+
switches
1,500+
enterprise
routers
140+
Windows Domain
Controllers
Infrastructure
11.5M+
Internet mails per
day sent/received
150K+
mobile devices39M
IP Addresses
1.2M
devices
450K
mailboxes
managed
Connectivity
2.5B
security events
logged per day
2K+
managed firewalls
970K+
devices scanned for
vulnerabilities
450K
end points
protected with
anti-virus
Security
Security events data
HPE IT operates ArcSight
internally
Deployment 25% larger than
any other non-governmental
installation by volume
1
10
100
1000
10000
100000
1000000
1 2 3 4 5 6
Eventspersecond(logarithmicscale)
DNS traffic per HPE data
centre:
– 120,000 events/second
– ~64B events/day globally
Routers VPN AntiVirus Active Directory Web Proxy DNS
64 billion
DNS events/day
whitelist/blacklist 99%
4
640 million
greylisted events
Collection is just part of the story
Analytics is where the power comes from
5
Correlation
Machine learning
Graph analytics
Anomaly detection
Advanced persistent threats
Data exfiltration
User behaviour analysis/insider threat
Endpoint visibility
Abuse case
Botnet command and control
Bot DNS server
akaajkajkajd.cn?
xisyudnwuxu.ru?
dfknwerpbnp.biz?
mneyqslgyb.info?
cspcicicipisjjew.hu?
C2 Server
(mneyqslgyb.info)
Attacker can’t maintain C2 server
at IP address for very long.
So it registers a random domain
name temporarily.
Bot tries a bunch of random
names until it finds one that
resolves.
AssetAsset
Abuse case
DNS tunneling (via subdomains)
Bot DNS server (Compromised) DNS
server
(example.com)
93cc3daf.example.com4fac3215.example.coma86f4221.example.comddee9152.example.com8bd5ff12.example.comd4bb92a1.example.comef409132.example.com1bfa3207.example.com298c5b3a.example.com
Solution architecture: Overview
8
DNS server(s)
DNS packet
capture
Whitelist
network
tap
DNS queries
and responses
Blacklist
Event logging Correlation and
alerting
Real-time processing
Near-time, historical analysis
DNS events:
queries and replies
In use at HPE
Hewlett Packard Enterprise
Cyber Defense Center, Palo Alto
9
From Labs … to HPE … to Customers
10
Screenshot from HPE DNS Malware Analytics
– HPE DNS Malware
Analytics
– Cloud-based managed
or self-service analytics
with on-premises
capture modules
The next challenges
11
? days ?
5 minutes
24 hours
Increase the correlation
time window
Data exfiltration “hidden in
the noise”
Exfil
time
The next challenges
12
Security
Events
DNS Outgoing
ISP Packets
2.5
64
660
BillionsofEventsPerDay
0
700
350
Complete packet capture
for all outgoing ISP
connections
Thank you
james.salter@hpe.com
13

More Related Content

PPTX
Security for The Machine: By Design
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PPT
DHS ICS Security Presentation
PDF
Intelligent Wireless Sensor Network based Monitoring for Process Automation
PPTX
ICS Security 101 by Sandeep Singh
PDF
DBOps
PPTX
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
PPSX
Motion based security alarm
Security for The Machine: By Design
Blackhat USA 2016 - What's the DFIRence for ICS?
DHS ICS Security Presentation
Intelligent Wireless Sensor Network based Monitoring for Process Automation
ICS Security 101 by Sandeep Singh
DBOps
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
Motion based security alarm

What's hot (20)

PDF
Chapter 1 pdf
PDF
Software Defined Substation Intelligence, Automation and Control
PPTX
The Future of ICS Security Products
PDF
ExtraHop Splunk datasheet
PPTX
BSidesAugusta ICS SCADA Defense
PDF
6. Kepware_IIoT_Solution
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
PDF
ExtraHop Product Overview Datasheet
PPTX
Internet of things v1.2
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
DEF CON 23 - NSM 101 for ICS
PDF
Federal Agencies top 10 Use Cases
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PPTX
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
PDF
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
PDF
The journey to ICS - Extended
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PDF
Meeting 3 network administrator tools
PDF
Keynote: Elastic Observability evolution and vision
PPTX
Virtual Firewall Management
Chapter 1 pdf
Software Defined Substation Intelligence, Automation and Control
The Future of ICS Security Products
ExtraHop Splunk datasheet
BSidesAugusta ICS SCADA Defense
6. Kepware_IIoT_Solution
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
ExtraHop Product Overview Datasheet
Internet of things v1.2
Cybersecurity in Industrial Control Systems (ICS)
DEF CON 23 - NSM 101 for ICS
Federal Agencies top 10 Use Cases
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
The journey to ICS - Extended
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Meeting 3 network administrator tools
Keynote: Elastic Observability evolution and vision
Virtual Firewall Management
Ad

Viewers also liked (20)

PDF
Big data Europe: concept, platform and pilots
PPTX
A Big Data Concept
PPTX
Big Data in Cyber Security
PDF
Big data and cyber security legal risks and challenges
PPT
Computer&Internet Safety Digital Story
PPTX
Being Smart In Cyber Space
PPT
Malware
PPTX
Digital Etiquette vhardy
PPT
Stay safe online
PPSX
Cyber Crime: Stay Safe Online
PDF
Good Practices and Recommendations on the Security and Resilience of Big Data...
PDF
MS PPM Summit Chicago_Nov 2015
PPT
Mobile phone Data Hacking
PPTX
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
PDF
SECQME Watch Over Me Deck 2014
PPTX
Hacking Mobile Apps
PDF
Cyber Security Awareness at Dadar April 25, 2010
PDF
Big data in healthcare
PPTX
Android Hacking + Pentesting
PPTX
Android– forensics and security testing
Big data Europe: concept, platform and pilots
A Big Data Concept
Big Data in Cyber Security
Big data and cyber security legal risks and challenges
Computer&Internet Safety Digital Story
Being Smart In Cyber Space
Malware
Digital Etiquette vhardy
Stay safe online
Cyber Crime: Stay Safe Online
Good Practices and Recommendations on the Security and Resilience of Big Data...
MS PPM Summit Chicago_Nov 2015
Mobile phone Data Hacking
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
SECQME Watch Over Me Deck 2014
Hacking Mobile Apps
Cyber Security Awareness at Dadar April 25, 2010
Big data in healthcare
Android Hacking + Pentesting
Android– forensics and security testing
Ad

Similar to Big data ... for security (20)

PPTX
Big Data for Security
PPTX
Security intelligence using big data presentation (engineering seminar)
PPTX
Big Data for Security - Threat Analytics
PPTX
Big Data for Security - DNS Analytics
PPTX
Big Data for Security - DNS Analytics
PPTX
Big Data for Security - DNS Analytics
PPTX
Big Data Security Analytics (BDSA) with Randy Franklin
PDF
El contexto de la integración masiva de datos
PDF
Kind of big data in info sec
PPTX
Advanced threat protection and big data
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PPTX
HPE-Security update talk presented in Vienna to partners on 15th April 2016
PDF
TT3161_Afonin
PPTX
SplunkLive! Splunk for Security
PPTX
Big Data and Security - Where are we now? (2015)
PDF
HP Software Performance Tour 2014 - Apps, Big Data and Security 20/20
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PDF
Big security for big data
PPTX
Big data security
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Big Data for Security
Security intelligence using big data presentation (engineering seminar)
Big Data for Security - Threat Analytics
Big Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
Big Data Security Analytics (BDSA) with Randy Franklin
El contexto de la integración masiva de datos
Kind of big data in info sec
Advanced threat protection and big data
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
HPE-Security update talk presented in Vienna to partners on 15th April 2016
TT3161_Afonin
SplunkLive! Splunk for Security
Big Data and Security - Where are we now? (2015)
HP Software Performance Tour 2014 - Apps, Big Data and Security 20/20
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big security for big data
Big data security
Finding the needle in the haystack: how Nestle is leveraging big data to defe...

More from James Salter (10)

PPTX
The Machine - a vision for the future of computing
PPTX
Accumulo: A Quick Introduction
PPTX
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
PPTX
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PPT
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PPTX
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
PPT
Agents and P2P Networks
PPT
Lecture - Network Technologies: Peer-to-Peer Networks
PPT
Lecture: Software Agents and P2P
PPTX
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
The Machine - a vision for the future of computing
Accumulo: A Quick Introduction
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
Agents and P2P Networks
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture: Software Agents and P2P
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids

Recently uploaded (20)

PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PDF
Mega Projects Data Mega Projects Data
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PDF
Transcultural that can help you someday.
PPTX
Database Infoormation System (DBIS).pptx
PPT
Quality review (1)_presentation of this 21
PDF
[EN] Industrial Machine Downtime Prediction
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Lecture1 pattern recognition............
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPTX
Leprosy and NLEP programme community medicine
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
Introduction to Data Science and Data Analysis
PPTX
Introduction to Knowledge Engineering Part 1
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
Mega Projects Data Mega Projects Data
Introduction-to-Cloud-ComputingFinal.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Transcultural that can help you someday.
Database Infoormation System (DBIS).pptx
Quality review (1)_presentation of this 21
[EN] Industrial Machine Downtime Prediction
Miokarditis (Inflamasi pada Otot Jantung)
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
IBA_Chapter_11_Slides_Final_Accessible.pptx
Lecture1 pattern recognition............
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
Leprosy and NLEP programme community medicine
Qualitative Qantitative and Mixed Methods.pptx
Introduction to Data Science and Data Analysis
Introduction to Knowledge Engineering Part 1

Big data ... for security

  • 1. Big data … for security James Salter Hewlett Packard Labs December 3, 2015
  • 2. This is what we are dealing with... 2 6 Next generation data centres 300K+ Employees and contractors A massive IT operation 41K+ servers 440K+ PCs deployed 15K+ switches 1,500+ enterprise routers 140+ Windows Domain Controllers Infrastructure 11.5M+ Internet mails per day sent/received 150K+ mobile devices39M IP Addresses 1.2M devices 450K mailboxes managed Connectivity 2.5B security events logged per day 2K+ managed firewalls 970K+ devices scanned for vulnerabilities 450K end points protected with anti-virus Security
  • 3. Security events data HPE IT operates ArcSight internally Deployment 25% larger than any other non-governmental installation by volume 1 10 100 1000 10000 100000 1000000 1 2 3 4 5 6 Eventspersecond(logarithmicscale) DNS traffic per HPE data centre: – 120,000 events/second – ~64B events/day globally Routers VPN AntiVirus Active Directory Web Proxy DNS
  • 4. 64 billion DNS events/day whitelist/blacklist 99% 4 640 million greylisted events
  • 5. Collection is just part of the story Analytics is where the power comes from 5 Correlation Machine learning Graph analytics Anomaly detection Advanced persistent threats Data exfiltration User behaviour analysis/insider threat Endpoint visibility
  • 6. Abuse case Botnet command and control Bot DNS server akaajkajkajd.cn? xisyudnwuxu.ru? dfknwerpbnp.biz? mneyqslgyb.info? cspcicicipisjjew.hu? C2 Server (mneyqslgyb.info) Attacker can’t maintain C2 server at IP address for very long. So it registers a random domain name temporarily. Bot tries a bunch of random names until it finds one that resolves.
  • 7. AssetAsset Abuse case DNS tunneling (via subdomains) Bot DNS server (Compromised) DNS server (example.com) 93cc3daf.example.com4fac3215.example.coma86f4221.example.comddee9152.example.com8bd5ff12.example.comd4bb92a1.example.comef409132.example.com1bfa3207.example.com298c5b3a.example.com
  • 8. Solution architecture: Overview 8 DNS server(s) DNS packet capture Whitelist network tap DNS queries and responses Blacklist Event logging Correlation and alerting Real-time processing Near-time, historical analysis DNS events: queries and replies
  • 9. In use at HPE Hewlett Packard Enterprise Cyber Defense Center, Palo Alto 9
  • 10. From Labs … to HPE … to Customers 10 Screenshot from HPE DNS Malware Analytics – HPE DNS Malware Analytics – Cloud-based managed or self-service analytics with on-premises capture modules
  • 11. The next challenges 11 ? days ? 5 minutes 24 hours Increase the correlation time window Data exfiltration “hidden in the noise” Exfil time
  • 12. The next challenges 12 Security Events DNS Outgoing ISP Packets 2.5 64 660 BillionsofEventsPerDay 0 700 350 Complete packet capture for all outgoing ISP connections