SlideShare a Scribd company logo
Is That Normal? 
Behaviour modelling on the cheap 
Mark Nunnikhoven, bunch of letters 
@marknca 
Just like you probably can’t see this, I can’t see the backchannel 
Tweet me now @marknca, I’ll reply after the talk…
What is it? 
What folks are doing
Today’s talk 
Context 
The gap 
Getting started
Recently…
Is That Normal? Behaviour Modelling On The Cheap
450 000 000
Target 
27-Nov-2013—15-Dec-2013 
First CEO “resignation” due to information security incident
The Home Depot 
Early May-2014—Late Aug-2014 
a/k/a “Target 2”
ebay 
Late Feb-2014—Mid May-2014 
Nominated for “Worst Communications During An Incident”
Houston Astros 
17-Jun–2013—17-Oct-2014 
“Oh shit, they tried to trade me for an old bus and a hot dog vendor?”
Amazing visualization from Information Is Beautiful 
“World’s Biggest Data Breaches & Hacks”
0d 
Because it was successful, it was “an APT”…at least according to marketing
KISS 
Simple works. A lot. With minimal effort 
Why waste a “bunker buster” when they left the door open?
The Problem
Data 
Restrict inbound 
Restrict outbound 
Heavily monitor access
User 
Restrict inbound 
Allow outbound 
Little to no monitoring
Is That Normal? Behaviour Modelling On The Cheap
Authentication 
Authorization 
Yes, we only use 2 types of controls to police this space. Amazing isn’t it?
Authentication 
Authorization 
Behaviour analysis 
3 is more than 2. So that’s an immediate win when reporting up to your boss(es)
How?
What to look at 
All traffic leaving user space
What to look at 
All traffic leaving user space
What to look for 
Malicious patterns 
You might want to consider buying something here or at least Martin’s solution 
However, if you don’t have a strong process for handling alerts don’t bother!
What to look for 
Odd access patterns 
You can buy products that help here but we can get good ROI with DIY 
If you already have a SIEM, put this effort into tuning it’s rules & alerts
Starting point 
…and only a starting point
The Goal 
Provide actionable information 
to your team 
You’re never going to get 100% automated here 
BUT you can reduce your team’s workload
In order of importance 
Access 
Transactions 
Authentication 
<< fancy circles for no particular reason
And then? 
Dump it all in a database 
Yes, an old school relational database
Dump it? 
Well no…that’ll cause problems* 
* Only if you want to do anything with the data. 
If you want a(nother) shelfware project, go ahead 
The #1 problem with RDBMS is that few people consider 
what they want to get _out_ of them
Hardware Table Structure 
Desktop Hour 
Bigger Day 
Biggest Week 
Bigger-est Month 
Ridiculous This talk has “on the Cheap” in the title. 
Stop showing off 
It’s amazing what an old school DB can do when structured properly 
There is a reason why we’ve stuck with the tech for 40+ years
Anything else? 
Add metadata on ingestion* 
* You’re trying to save computation later on. And 
it’s easier to line up usernames or groups now 
rather than later. You can do fun things with 
caching too 
I felt like using the term “metadata” would add more credibility 
and a nice NSA-esque feeling here
Indices? 
Store the timestamp as 
YYYY-MM-DD-HH-MM-SS* 
* No wiggle room. It’s easier to do 
computations on this way 
First person to say “what about seconds since the epoch?” gets a free gift 
It’s not a good gift. You don’t want it. Trust me on this
Hardware Query Breadth (in tables) 
Desktop 1 
Bigger 2-3 
Biggest 3-5 
Bigger-est 3-5 
Ridiculous Didn’t you get the message on 2 slides ago? 
How you structure your query has a major impact on performance 
That should be obvious. If not, it is now
Hardware Query Size (in dimensions) 
More dimensions == slower performance but potentially more useful answers 
Use your judgement here 
Desktop 2-3 
Bigger 3-5 
Biggest 5-7 
Bigger-est 5-7 
Ridiculous Seriously, WTF?
How do I frame questions for the data? 
Based on the average of X, 
what are the outliers? 
* select min(thing_I_want) from (group_of_things_I_want) 
select max(thing_I_want) from (group_of_things_I_want) 
Not the Malcolm Gladwell Outliers, actual math-y type ones
Questions you should ask your data? 
<Timeline for logins> 
<Period of access for user> 
<Size of transaction> 
<Number of domains per day> 
* These four will net a lot of interesting info 
Start simple, build up the questions you ask based on success 
“If it isn’t actionable, get rid of it”, Rob Edwards < awesome guy
Use your logs 
Reduce work for your team 
Start small, build
Thanks! 
Mark Nunnikhoven 
@marknca 
Now send me a tweet ;-)

More Related Content

PDF
Delete Google Analytics - a Crazy Idea you MUST consider
PPTX
Minimalism (Presented to STC WDC and InfoDevDC)
PDF
Data Integrity - Patryk Hes
PPTX
Concept of normal and abnormal behaviour 1
PPT
Normal vs abnormal
PPTX
Concpets of normal and abnormal behavior
PDF
Behavioural approach
PPT
Understanding Teen Behaviour
Delete Google Analytics - a Crazy Idea you MUST consider
Minimalism (Presented to STC WDC and InfoDevDC)
Data Integrity - Patryk Hes
Concept of normal and abnormal behaviour 1
Normal vs abnormal
Concpets of normal and abnormal behavior
Behavioural approach
Understanding Teen Behaviour

Similar to Is That Normal? Behaviour Modelling On The Cheap (20)

PDF
7 data presentation tips
PDF
Industry of Things World - Berlin 19-09-16
PDF
50.000 orange stickies later
PDF
AI Is Changing The Way We Look At Data Science
 
PDF
Analytics-Enabled Experiences: The New Secret Weapon
PPTX
Neurodb Engr245 2021 Lessons Learned
PDF
What is Data Science? A Complete Guide to Tools, Careers, AI, and Future Trends
PDF
Less is More: Behind the Data at Risk I/O
PDF
Buried treasure - Discovering the hidden value of digital wallboards.
PPTX
Open Web Technologies and You - Durham College Student Integration Presentation
KEY
Data Driven Practice with e-MDs
PDF
danmcclary-pspresentation-katieboyle-171030115522.pdf
PDF
Lightning talk on the future of analytics - CloudCamp London, 2016
PPTX
Idiots guide to setting up a data science team
PDF
Putting data science in your business a first utility feedback
PDF
SkillsFuture Festival at NUS 2019- Machine Learning for Humans
PDF
101 ways to fail at security analytics ... and how not to do that - BSidesLV ...
PPTX
Analytics - How and why you are making a mess of it and ruining your analysts...
PPTX
Software estimation is crap
PPTX
Coaching teams in creative problem solving
7 data presentation tips
Industry of Things World - Berlin 19-09-16
50.000 orange stickies later
AI Is Changing The Way We Look At Data Science
 
Analytics-Enabled Experiences: The New Secret Weapon
Neurodb Engr245 2021 Lessons Learned
What is Data Science? A Complete Guide to Tools, Careers, AI, and Future Trends
Less is More: Behind the Data at Risk I/O
Buried treasure - Discovering the hidden value of digital wallboards.
Open Web Technologies and You - Durham College Student Integration Presentation
Data Driven Practice with e-MDs
danmcclary-pspresentation-katieboyle-171030115522.pdf
Lightning talk on the future of analytics - CloudCamp London, 2016
Idiots guide to setting up a data science team
Putting data science in your business a first utility feedback
SkillsFuture Festival at NUS 2019- Machine Learning for Humans
101 ways to fail at security analytics ... and how not to do that - BSidesLV ...
Analytics - How and why you are making a mess of it and ruining your analysts...
Software estimation is crap
Coaching teams in creative problem solving
Ad

More from Mark Nunnikhoven (13)

PDF
Advanced Security Automation Made Simple
PDF
AWS re:Invent 2017 re:View
PDF
Security Teams & Tech In A Cloud World
PDF
Defending your workloads with aws waf and deep security
PDF
AWS re:Invent 2015 re:Cap
PDF
Whodunit, The Mechanics of Attack Attribution
PDF
Power Struggle: Balancing Relationships & Responsibility in the Cloud
PDF
Security OF The Cloud
PDF
Shared Responsibility In Action
PDF
Infrastructure as (Secure) Code
PDF
Updating Security Operations For The Cloud
PDF
Shared Responsibility In Action
PDF
The Most Common Failure With Today's Defences
Advanced Security Automation Made Simple
AWS re:Invent 2017 re:View
Security Teams & Tech In A Cloud World
Defending your workloads with aws waf and deep security
AWS re:Invent 2015 re:Cap
Whodunit, The Mechanics of Attack Attribution
Power Struggle: Balancing Relationships & Responsibility in the Cloud
Security OF The Cloud
Shared Responsibility In Action
Infrastructure as (Secure) Code
Updating Security Operations For The Cloud
Shared Responsibility In Action
The Most Common Failure With Today's Defences
Ad

Recently uploaded (20)

PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PDF
Lecture1 pattern recognition............
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPT
Quality review (1)_presentation of this 21
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Global journeys: estimating international migration
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Mega Projects Data Mega Projects Data
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
Major-Components-ofNKJNNKNKNKNKronment.pptx
Lecture1 pattern recognition............
Galatica Smart Energy Infrastructure Startup Pitch Deck
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Quality review (1)_presentation of this 21
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Acceptance and paychological effects of mandatory extra coach I classes.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
.pdf is not working space design for the following data for the following dat...
Global journeys: estimating international migration
Introduction to Knowledge Engineering Part 1
Business Acumen Training GuidePresentation.pptx
Mega Projects Data Mega Projects Data
IBA_Chapter_11_Slides_Final_Accessible.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
Introduction-to-Cloud-ComputingFinal.pptx
Database Infoormation System (DBIS).pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx

Is That Normal? Behaviour Modelling On The Cheap

  • 1. Is That Normal? Behaviour modelling on the cheap Mark Nunnikhoven, bunch of letters @marknca Just like you probably can’t see this, I can’t see the backchannel Tweet me now @marknca, I’ll reply after the talk…
  • 2. What is it? What folks are doing
  • 3. Today’s talk Context The gap Getting started
  • 7. Target 27-Nov-2013—15-Dec-2013 First CEO “resignation” due to information security incident
  • 8. The Home Depot Early May-2014—Late Aug-2014 a/k/a “Target 2”
  • 9. ebay Late Feb-2014—Mid May-2014 Nominated for “Worst Communications During An Incident”
  • 10. Houston Astros 17-Jun–2013—17-Oct-2014 “Oh shit, they tried to trade me for an old bus and a hot dog vendor?”
  • 11. Amazing visualization from Information Is Beautiful “World’s Biggest Data Breaches & Hacks”
  • 12. 0d Because it was successful, it was “an APT”…at least according to marketing
  • 13. KISS Simple works. A lot. With minimal effort Why waste a “bunker buster” when they left the door open?
  • 15. Data Restrict inbound Restrict outbound Heavily monitor access
  • 16. User Restrict inbound Allow outbound Little to no monitoring
  • 18. Authentication Authorization Yes, we only use 2 types of controls to police this space. Amazing isn’t it?
  • 19. Authentication Authorization Behaviour analysis 3 is more than 2. So that’s an immediate win when reporting up to your boss(es)
  • 20. How?
  • 21. What to look at All traffic leaving user space
  • 22. What to look at All traffic leaving user space
  • 23. What to look for Malicious patterns You might want to consider buying something here or at least Martin’s solution However, if you don’t have a strong process for handling alerts don’t bother!
  • 24. What to look for Odd access patterns You can buy products that help here but we can get good ROI with DIY If you already have a SIEM, put this effort into tuning it’s rules & alerts
  • 25. Starting point …and only a starting point
  • 26. The Goal Provide actionable information to your team You’re never going to get 100% automated here BUT you can reduce your team’s workload
  • 27. In order of importance Access Transactions Authentication << fancy circles for no particular reason
  • 28. And then? Dump it all in a database Yes, an old school relational database
  • 29. Dump it? Well no…that’ll cause problems* * Only if you want to do anything with the data. If you want a(nother) shelfware project, go ahead The #1 problem with RDBMS is that few people consider what they want to get _out_ of them
  • 30. Hardware Table Structure Desktop Hour Bigger Day Biggest Week Bigger-est Month Ridiculous This talk has “on the Cheap” in the title. Stop showing off It’s amazing what an old school DB can do when structured properly There is a reason why we’ve stuck with the tech for 40+ years
  • 31. Anything else? Add metadata on ingestion* * You’re trying to save computation later on. And it’s easier to line up usernames or groups now rather than later. You can do fun things with caching too I felt like using the term “metadata” would add more credibility and a nice NSA-esque feeling here
  • 32. Indices? Store the timestamp as YYYY-MM-DD-HH-MM-SS* * No wiggle room. It’s easier to do computations on this way First person to say “what about seconds since the epoch?” gets a free gift It’s not a good gift. You don’t want it. Trust me on this
  • 33. Hardware Query Breadth (in tables) Desktop 1 Bigger 2-3 Biggest 3-5 Bigger-est 3-5 Ridiculous Didn’t you get the message on 2 slides ago? How you structure your query has a major impact on performance That should be obvious. If not, it is now
  • 34. Hardware Query Size (in dimensions) More dimensions == slower performance but potentially more useful answers Use your judgement here Desktop 2-3 Bigger 3-5 Biggest 5-7 Bigger-est 5-7 Ridiculous Seriously, WTF?
  • 35. How do I frame questions for the data? Based on the average of X, what are the outliers? * select min(thing_I_want) from (group_of_things_I_want) select max(thing_I_want) from (group_of_things_I_want) Not the Malcolm Gladwell Outliers, actual math-y type ones
  • 36. Questions you should ask your data? <Timeline for logins> <Period of access for user> <Size of transaction> <Number of domains per day> * These four will net a lot of interesting info Start simple, build up the questions you ask based on success “If it isn’t actionable, get rid of it”, Rob Edwards < awesome guy
  • 37. Use your logs Reduce work for your team Start small, build
  • 38. Thanks! Mark Nunnikhoven @marknca Now send me a tweet ;-)