SlideShare a Scribd company logo
Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia
Dr.AA (Dr.Aswami Ariffin)
SVP & Digital Forensics Scientist
Cyber Security Responsive Services
CyberSecurity Malaysia
aswami@cybersecurity.my
CyberI3 System -
Intelligence, Incidence & Investigation Based Big
Data Technology
Copyright © 2018 CyberSecurity Malaysia
1. Cyber Threat Landscape
Copyright © 2018 CyberSecurity Malaysia
,090,77721
68.1% population
Copyright © 2018 CyberSecurity Malaysia
Copyright © 2018 CyberSecurity Malaysia
INTEL chipset bug
Copyright © 2018 CyberSecurity Malaysia
2. CyberFIC – Forensics
Intelligence Center
Copyright © 2018 CyberSecurity Malaysia
#ITUCyberSecurityStudy
{Technical, CapacityBuilding, Cooperation, Legal,
Organizational}
Copyright © 2018 CyberSecurity Malaysia
CyberFIT
Copyright © 2018 CyberSecurity Malaysia
#CyberDefenceWarRoom
{ChainOfCustody, Command, Trust}
Copyright © 2018 CyberSecurity Malaysia
CyberACT
Copyright © 2018 CyberSecurity Malaysia
#CyberDefenceMalaysia
{Intelligence, Incidence, Investigation}
Copyright © 2018 CyberSecurity Malaysia
Copyright © 2018 CyberSecurity Malaysia
Our 2 years journey
(2016-2018)
Feb 2016
MOU/MOA
Signed, Title &
Concept
Aug 2016 - SRS, SDD
(Initial Design),
Satellite Lab
Feb 2016 - Revised SRS,
SDD (Detail Design),
STP, Research Papers,
the Proof of Concept of
Big Data Platform
Oct 2017 – Optimization
Report, Proof of
Concept, Testing
Documents, Research
Papers
Feb 2018 – Final
Report, Research
Papers
Copyright © 2018 CyberSecurity Malaysia
The team & funding
UTM Team (Consultant & Research)
• Prof Dr Shamsul Sahibuddin
• PM Dr Mohd Naz’ri Mahrin
• PM Dr Azurati Ahmad
• Dr Ganthan Narayana Samy
• Dr Priteega Mahalingam
• Dr Syahid Anuar
• Dr Suriayati Chuprat
Consultation
RM 1.72 Million
Research
RM 556.6 K
CSM Team
•Dr Aswami Ariffin (Dr AA)
•Mohd Zabri Adil Talib
•Mohamad Firham Effendy
•Fakhrul Afiq Abd Aziz
•Muhammad Zaharudin
•Nazri Ahmad Zamani
•Nur Afifah Mohd Saupi
•Nor Zarina Zainal Abidin
•Wafa Mohd Khairudin
•Yasmin Jeffry
Copyright © 2018 CyberSecurity Malaysia
The beginning…
Copyright © 2018 CyberSecurity Malaysia
CyberI3 framework
Data Warehouse
Is a component that will be the central repository for the storing data sent
by CMERP. Data will be enriched to become more meaningful for further
analytics.
Data Analytics
Data will be further analyzed, correlated and uncovered any possible
hidden patterns or connections using collected historical data. Will
perform descriptive analytics and predictive analytics to discover the
future malware attacks.
Visualization
Descriptive and predictive analytics results will be presented in a pictorial
or graphical format to enable decision makers to view the analytics
graphically. Will be used as evidence in forensic investigations and can be
used to distribute warning to the targeted organization.
Copyright © 2018 CyberSecurity Malaysia
Understanding the requirements
• Software
engineering
Practices
• Series of
workshops, training
and reviews
• Developed the
software
requirement
specifications (SRS)
Copyright © 2018 CyberSecurity Malaysia
Translating the requirements
to design
• Series of workshops
& reviews
• Developed the
Software Design
Document (SDD)
• Knowledge sharing
by the related
industry
Copyright © 2018 CyberSecurity Malaysia
CyberI3 framework implementation
Copyright © 2018 CyberSecurity Malaysia
Implementation (proof of concept)
Copyright © 2018 CyberSecurity Malaysia
• SLR
– Malware
Predictions
– Malware
Analytics
Techniques
– Visualization
Techniques
Concurrently… we do research
Systematic	Literature	
Review
Prediction	Techniques	
Selection
Prediction	Techniques	
Evaluation
Development	of	ICE	
Systems	(Data	Analytic	
Module)
Copyright © 2018 CyberSecurity Malaysia
Optimizing the implementation
• Evaluation
– Machine Learning
Algorithms
– Computing Platforms
MSE RMSE MAE
(Mean (Root Mean (Mean Absolute
Square Square Error) Error)
Error)
Linear 0.0581 0.241 0.1994
Regression
Random Forest 0.1959 0.4426 0.3852
ANN 0.1083 0.3291 0.2872
SVM 0.0442 0.2102 0.1689
ARIMA 0.0454 0.213 0.1711
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-i
Copyright © 2018 CyberSecurity Malaysia
#GlobalCyberThreat
{Internal, External}
Copyright © 2018 CyberSecurity Malaysia
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-ii
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-iii
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-iv
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-v
Copyright © 2018 CyberSecurity Malaysia
CyberI3 dashboard-vi
Copyright © 2018 CyberSecurity Malaysia
Predictive signature and
prescriptive
solution
Copyright © 2018 CyberSecurity Malaysia
CyberI3 system; e.g. content analysis
& visualization
32
Copyright © 2018 CyberSecurity Malaysia
CyberI3 Cluster
Copyright © 2018 CyberSecurity Malaysia
#CyberLaw@CyberCSI
#UncoveringTruthBeyondDigitalImagination
{Prosecution, ExpertWitness, Takedown}
Copyright © 2018 CyberSecurity Malaysia
3. Conclusion
• People; operational + research (training & experience)
• Process; coordination
• Technology; facilitation
• Based on statistics be alert; awareness!
• Normally increase if there is major event e.g. MH 370
• New vulnerability/exploit/zero-day
• Based on cyber threat intelligence targeting
corporation/organization; CNII be careful!
• Ransomware on the rise; motivation is monetary gain
• Attack is getting sophisticated, mobile; Target/Sony!
• A lot research needed! @ Threat hunting…
Copyright © 2018 CyberSecurity Malaysia
Final deliverables (consultation)
• Software Requirement Specification (SRS)
• Software Design Document (SDD)
• Software Test Plan (STP)
• Optimization Report
• Final Report
• Closing Report
Copyright © 2018 CyberSecurity Malaysia
Final deliverables (research)
• 5 Journal Articles
–Malware Prediction Algorithm: Systematic Review (Scopus
Indexed)
–Malware Prediction Techniques: Selection and
Implementation for Integrated Cyber Evidence (ISI
Indexed)
–Classification of Malware Analytics Techniques: A
Systematic Literature Review (ISI Indexed)
–Analysis of Features for Malware Visualization (Scopus
Indexed)
–Systematic Literature Review for Malware Visualization
Techniques (Scopus Indexed)
Copyright © 2018 CyberSecurity Malaysia
Final deliverables (research)
• 2 Conference Proceedings
–Modeling Malware Prediction Using Artificial Neural
Network (presented in SOMET 2018, Spain)
–Malware Forensic Analytics Framework Using Big Data
Platform (to be presented at Future Technology
Conference, Vancouver Canada in November 2018)
• Satellite Lab @ Level 3 Menara Razak UTM Kuala
Lumpur
Copyright © 2018 CyberSecurity Malaysia
Experiences
• Smart Partnership
• Setting up Big Data Platform
• Hands on HCP Apache Metron Setup
• Professional Trainings with Hortonworks
– Apache NIFI
– Apache Metron
– HDP Developer – Enterprise Apache Spark
• 60-40 Data Science Practices
• Software Engineering Practices
Copyright © 2018 CyberSecurity Malaysia
#CyberDefenceAlliance
{CyberFIT, CyberACT, CyberDEF}
Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia 41
Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia 42

More Related Content

PPTX
Data Science at Speed. At Scale.
PDF
Hybrid Cloud Strategy for Big Data and Analytics
PPTX
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
PPTX
Digital Shift in Insurance: How is the Industry Responding with the Influx of...
PPTX
Addressing Challenges with IoT Edge Management
PPTX
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
PDF
Dataguise hortonworks insurance_feb25
PPTX
Hilton's enterprise data journey
Data Science at Speed. At Scale.
Hybrid Cloud Strategy for Big Data and Analytics
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
Digital Shift in Insurance: How is the Industry Responding with the Influx of...
Addressing Challenges with IoT Edge Management
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Dataguise hortonworks insurance_feb25
Hilton's enterprise data journey

What's hot (20)

PPTX
Spark and Hadoop Perfect Togeher by Arun Murthy
PPTX
The curious case of data lake redemption
PPTX
Balancing data democratization with comprehensive information governance: bui...
PDF
Privacy-Preserving AI Network - PlatON 2.0
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PPTX
Platform for the Research and Analysis of Cybernetic Threats
PPTX
Building intelligent applications, experimental ML with Uber’s Data Science W...
PPTX
2016 Cybersecurity Analytics State of the Union
PDF
3 CTOs Discuss the Shift to Next-Gen Analytic Ecosystems
PPTX
The 5 Biggest Data Myths in Telco: Exposed
PPTX
Intro to Big Data Analytics and the Hybrid Cloud
PPTX
How Cloudera SDX can aid GDPR compliance 6.21.18
PDF
First in Class: Optimizing the Data Lake for Tighter Integration
PPTX
When SAP alone is not enough
PPTX
Achieving a 360 degree view of manufacturing
PDF
Hadoop Crash Course
PPTX
Data Aggregation, Curation and analytics for security and situational awareness
PPTX
Applying Noisy Knowledge Graphs to Real Problems
PPTX
IoT-Enabled Predictive Maintenance
PDF
Zementis hortonworks-webinar-2014-09
Spark and Hadoop Perfect Togeher by Arun Murthy
The curious case of data lake redemption
Balancing data democratization with comprehensive information governance: bui...
Privacy-Preserving AI Network - PlatON 2.0
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Platform for the Research and Analysis of Cybernetic Threats
Building intelligent applications, experimental ML with Uber’s Data Science W...
2016 Cybersecurity Analytics State of the Union
3 CTOs Discuss the Shift to Next-Gen Analytic Ecosystems
The 5 Biggest Data Myths in Telco: Exposed
Intro to Big Data Analytics and the Hybrid Cloud
How Cloudera SDX can aid GDPR compliance 6.21.18
First in Class: Optimizing the Data Lake for Tighter Integration
When SAP alone is not enough
Achieving a 360 degree view of manufacturing
Hadoop Crash Course
Data Aggregation, Curation and analytics for security and situational awareness
Applying Noisy Knowledge Graphs to Real Problems
IoT-Enabled Predictive Maintenance
Zementis hortonworks-webinar-2014-09
Ad

Similar to Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data Technology (20)

PDF
Establishment of Threat Intel into Incident Response
PPTX
How Data Analytics is Re-defining Modern Era in Cyber Security
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PDF
Telesoft Cyber Threat Hunting Infographic
PPT
Real-Time Analytics for Industries
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Detection Rules Coverage
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Cybersecurity Threats - NI Business Continuity Forum
PPTX
Proactive_AI-driven_Cyber_Defense_Research_Plan.pptx
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PPT
Intrusion detection 2001
PDF
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Cyber security with ai
PPTX
Operational Security Intelligence
PDF
Why_TG
Establishment of Threat Intel into Incident Response
How Data Analytics is Re-defining Modern Era in Cyber Security
The role of big data, artificial intelligence and machine learning in cyber i...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Telesoft Cyber Threat Hunting Infographic
Real-Time Analytics for Industries
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Detection Rules Coverage
Big Data Analytics for Cyber Security: A Quick Overview
Cybersecurity Threats - NI Business Continuity Forum
Proactive_AI-driven_Cyber_Defense_Research_Plan.pptx
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Intrusion detection 2001
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber security with ai
Operational Security Intelligence
Why_TG
Ad

More from DataWorks Summit (20)

PPTX
Data Science Crash Course
PPTX
Floating on a RAFT: HBase Durability with Apache Ratis
PPTX
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
PDF
HBase Tales From the Trenches - Short stories about most common HBase operati...
PPTX
Optimizing Geospatial Operations with Server-side Programming in HBase and Ac...
PPTX
Managing the Dewey Decimal System
PPTX
Practical NoSQL: Accumulo's dirlist Example
PPTX
HBase Global Indexing to support large-scale data ingestion at Uber
PPTX
Scaling Cloud-Scale Translytics Workloads with Omid and Phoenix
PPTX
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
PPTX
Supporting Apache HBase : Troubleshooting and Supportability Improvements
PPTX
Security Framework for Multitenant Architecture
PDF
Presto: Optimizing Performance of SQL-on-Anything Engine
PPTX
Introducing MlFlow: An Open Source Platform for the Machine Learning Lifecycl...
PPTX
Extending Twitter's Data Platform to Google Cloud
PPTX
Event-Driven Messaging and Actions using Apache Flink and Apache NiFi
PPTX
Securing Data in Hybrid on-premise and Cloud Environments using Apache Ranger
PPTX
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
PDF
Computer Vision: Coming to a Store Near You
PPTX
Big Data Genomics: Clustering Billions of DNA Sequences with Apache Spark
Data Science Crash Course
Floating on a RAFT: HBase Durability with Apache Ratis
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
HBase Tales From the Trenches - Short stories about most common HBase operati...
Optimizing Geospatial Operations with Server-side Programming in HBase and Ac...
Managing the Dewey Decimal System
Practical NoSQL: Accumulo's dirlist Example
HBase Global Indexing to support large-scale data ingestion at Uber
Scaling Cloud-Scale Translytics Workloads with Omid and Phoenix
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Supporting Apache HBase : Troubleshooting and Supportability Improvements
Security Framework for Multitenant Architecture
Presto: Optimizing Performance of SQL-on-Anything Engine
Introducing MlFlow: An Open Source Platform for the Machine Learning Lifecycl...
Extending Twitter's Data Platform to Google Cloud
Event-Driven Messaging and Actions using Apache Flink and Apache NiFi
Securing Data in Hybrid on-premise and Cloud Environments using Apache Ranger
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Computer Vision: Coming to a Store Near You
Big Data Genomics: Clustering Billions of DNA Sequences with Apache Spark

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
gpt5_lecture_notes_comprehensive_20250812015547.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx

Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data Technology

  • 1. Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia Dr.AA (Dr.Aswami Ariffin) SVP & Digital Forensics Scientist Cyber Security Responsive Services CyberSecurity Malaysia aswami@cybersecurity.my CyberI3 System - Intelligence, Incidence & Investigation Based Big Data Technology
  • 2. Copyright © 2018 CyberSecurity Malaysia 1. Cyber Threat Landscape
  • 3. Copyright © 2018 CyberSecurity Malaysia ,090,77721 68.1% population
  • 4. Copyright © 2018 CyberSecurity Malaysia
  • 5. Copyright © 2018 CyberSecurity Malaysia INTEL chipset bug
  • 6. Copyright © 2018 CyberSecurity Malaysia 2. CyberFIC – Forensics Intelligence Center
  • 7. Copyright © 2018 CyberSecurity Malaysia #ITUCyberSecurityStudy {Technical, CapacityBuilding, Cooperation, Legal, Organizational}
  • 8. Copyright © 2018 CyberSecurity Malaysia CyberFIT
  • 9. Copyright © 2018 CyberSecurity Malaysia #CyberDefenceWarRoom {ChainOfCustody, Command, Trust}
  • 10. Copyright © 2018 CyberSecurity Malaysia CyberACT
  • 11. Copyright © 2018 CyberSecurity Malaysia #CyberDefenceMalaysia {Intelligence, Incidence, Investigation}
  • 12. Copyright © 2018 CyberSecurity Malaysia
  • 13. Copyright © 2018 CyberSecurity Malaysia Our 2 years journey (2016-2018) Feb 2016 MOU/MOA Signed, Title & Concept Aug 2016 - SRS, SDD (Initial Design), Satellite Lab Feb 2016 - Revised SRS, SDD (Detail Design), STP, Research Papers, the Proof of Concept of Big Data Platform Oct 2017 – Optimization Report, Proof of Concept, Testing Documents, Research Papers Feb 2018 – Final Report, Research Papers
  • 14. Copyright © 2018 CyberSecurity Malaysia The team & funding UTM Team (Consultant & Research) • Prof Dr Shamsul Sahibuddin • PM Dr Mohd Naz’ri Mahrin • PM Dr Azurati Ahmad • Dr Ganthan Narayana Samy • Dr Priteega Mahalingam • Dr Syahid Anuar • Dr Suriayati Chuprat Consultation RM 1.72 Million Research RM 556.6 K CSM Team •Dr Aswami Ariffin (Dr AA) •Mohd Zabri Adil Talib •Mohamad Firham Effendy •Fakhrul Afiq Abd Aziz •Muhammad Zaharudin •Nazri Ahmad Zamani •Nur Afifah Mohd Saupi •Nor Zarina Zainal Abidin •Wafa Mohd Khairudin •Yasmin Jeffry
  • 15. Copyright © 2018 CyberSecurity Malaysia The beginning…
  • 16. Copyright © 2018 CyberSecurity Malaysia CyberI3 framework Data Warehouse Is a component that will be the central repository for the storing data sent by CMERP. Data will be enriched to become more meaningful for further analytics. Data Analytics Data will be further analyzed, correlated and uncovered any possible hidden patterns or connections using collected historical data. Will perform descriptive analytics and predictive analytics to discover the future malware attacks. Visualization Descriptive and predictive analytics results will be presented in a pictorial or graphical format to enable decision makers to view the analytics graphically. Will be used as evidence in forensic investigations and can be used to distribute warning to the targeted organization.
  • 17. Copyright © 2018 CyberSecurity Malaysia Understanding the requirements • Software engineering Practices • Series of workshops, training and reviews • Developed the software requirement specifications (SRS)
  • 18. Copyright © 2018 CyberSecurity Malaysia Translating the requirements to design • Series of workshops & reviews • Developed the Software Design Document (SDD) • Knowledge sharing by the related industry
  • 19. Copyright © 2018 CyberSecurity Malaysia CyberI3 framework implementation
  • 20. Copyright © 2018 CyberSecurity Malaysia Implementation (proof of concept)
  • 21. Copyright © 2018 CyberSecurity Malaysia • SLR – Malware Predictions – Malware Analytics Techniques – Visualization Techniques Concurrently… we do research Systematic Literature Review Prediction Techniques Selection Prediction Techniques Evaluation Development of ICE Systems (Data Analytic Module)
  • 22. Copyright © 2018 CyberSecurity Malaysia Optimizing the implementation • Evaluation – Machine Learning Algorithms – Computing Platforms MSE RMSE MAE (Mean (Root Mean (Mean Absolute Square Square Error) Error) Error) Linear 0.0581 0.241 0.1994 Regression Random Forest 0.1959 0.4426 0.3852 ANN 0.1083 0.3291 0.2872 SVM 0.0442 0.2102 0.1689 ARIMA 0.0454 0.213 0.1711
  • 23. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-i
  • 24. Copyright © 2018 CyberSecurity Malaysia #GlobalCyberThreat {Internal, External}
  • 25. Copyright © 2018 CyberSecurity Malaysia
  • 26. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-ii
  • 27. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-iii
  • 28. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-iv
  • 29. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-v
  • 30. Copyright © 2018 CyberSecurity Malaysia CyberI3 dashboard-vi
  • 31. Copyright © 2018 CyberSecurity Malaysia Predictive signature and prescriptive solution
  • 32. Copyright © 2018 CyberSecurity Malaysia CyberI3 system; e.g. content analysis & visualization 32
  • 33. Copyright © 2018 CyberSecurity Malaysia CyberI3 Cluster
  • 34. Copyright © 2018 CyberSecurity Malaysia #CyberLaw@CyberCSI #UncoveringTruthBeyondDigitalImagination {Prosecution, ExpertWitness, Takedown}
  • 35. Copyright © 2018 CyberSecurity Malaysia 3. Conclusion • People; operational + research (training & experience) • Process; coordination • Technology; facilitation • Based on statistics be alert; awareness! • Normally increase if there is major event e.g. MH 370 • New vulnerability/exploit/zero-day • Based on cyber threat intelligence targeting corporation/organization; CNII be careful! • Ransomware on the rise; motivation is monetary gain • Attack is getting sophisticated, mobile; Target/Sony! • A lot research needed! @ Threat hunting…
  • 36. Copyright © 2018 CyberSecurity Malaysia Final deliverables (consultation) • Software Requirement Specification (SRS) • Software Design Document (SDD) • Software Test Plan (STP) • Optimization Report • Final Report • Closing Report
  • 37. Copyright © 2018 CyberSecurity Malaysia Final deliverables (research) • 5 Journal Articles –Malware Prediction Algorithm: Systematic Review (Scopus Indexed) –Malware Prediction Techniques: Selection and Implementation for Integrated Cyber Evidence (ISI Indexed) –Classification of Malware Analytics Techniques: A Systematic Literature Review (ISI Indexed) –Analysis of Features for Malware Visualization (Scopus Indexed) –Systematic Literature Review for Malware Visualization Techniques (Scopus Indexed)
  • 38. Copyright © 2018 CyberSecurity Malaysia Final deliverables (research) • 2 Conference Proceedings –Modeling Malware Prediction Using Artificial Neural Network (presented in SOMET 2018, Spain) –Malware Forensic Analytics Framework Using Big Data Platform (to be presented at Future Technology Conference, Vancouver Canada in November 2018) • Satellite Lab @ Level 3 Menara Razak UTM Kuala Lumpur
  • 39. Copyright © 2018 CyberSecurity Malaysia Experiences • Smart Partnership • Setting up Big Data Platform • Hands on HCP Apache Metron Setup • Professional Trainings with Hortonworks – Apache NIFI – Apache Metron – HDP Developer – Enterprise Apache Spark • 60-40 Data Science Practices • Software Engineering Practices
  • 40. Copyright © 2018 CyberSecurity Malaysia #CyberDefenceAlliance {CyberFIT, CyberACT, CyberDEF}
  • 41. Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia 41
  • 42. Copyright © 2018 CyberSecurity MalaysiaCopyright © 2018 CyberSecurity Malaysia 42