© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
June 28, 2016
Near Real-time Outlier Detection and Interpretation
An Hadoop Based Approach
Hadoop Summit 2016
Bob Thorman
Principal – Technology Security
AT&T Chief Security Organization
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
2
Presentation Outline:
Brief Context of the Problem of Cyber Threats in our industry
Recent History of AT&T Cyber Threat Capabilities
Hadoop Based Approach to Threat Analytics Platform
Cyber Threat Detection and Interpretation
Insider Threat
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
The Problem of Cyber Threats in Our Industry
A Brief Context
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
4
Network Scale
• ~1M Authenticated users
• ~800K user oriented devices
• ~1100 security devices on the network (FW, IDS, etc.)
• Approximately 5B network events per day
– Firewall, Proxy, IDS, SIEM, etc.
Facing Alarming Trends Bridging to the Internet
• Next Slides
The Problem of Cyber Threats in Our Industry
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
5
Distributed Reflection DoS (DrDoS) Attack Evolution
Attack activity trending up
Oct 2013
 1900/udp: SSDP
 123/udp: NTP
 19/udp: chargen
 0/udp: packet fragmentation
 53/udp: DNS (some legitimate)30
months
shown
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
Recent History of AT&T Cyber Threat Protection Capabilities
A Need for Big Data
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
History of AT&T Cyber Threat Protection Capabilities
Chief Security Office
– 2002 Program concept for millions of records per day
– 2005 Program concept tens of millions of records per day
– 2016 Big Data concept for tens of billions events/day
– 2017 Big Data concepts for trillions events/day
Major Big Data Development Milestone
– 2008 Beginnings of Accumulo, an implementation of Google™ Bigtable
– 2011 Accumulo open sourced to Apache Software Foundation
– 2013 AT&T initiates Threat Analytics modernization project
– 2014 AT&T initiates deployment of Hadoop-based Threat Analytics Platform
Cyber Threat Protection Platform Architecture Evolution
– Next slides
7
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
Threat Platform of Yesterday
SIEM
8
Source/processing/analytics DBMS/SAN Query
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
Threat Detection and Interpretation Process
9
Architectural Component
Ingestion
Outlier Detection1
Spark Streaming Detectors1
R Analytics1
Web UI
Dashboards
Custom Alerting Framework1
Threat Operations
1Area of focus for automation
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
An Hadoop Based Approach to Threat Analytics Platform
Securing AT&T with Hadoop
Detecting and Interpreting Cyber Threats at AT&T
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.
Today’s Platform Details
Using An Hadoop Based Platform for Log Management, Threat Analysis, Reporting
AT&T approach to use of Hadoop in a Threat Analysis Platform
SIEM
Raw logs
Events, Intelligence,
Alarms, Threats
Results,
Reports,
Analytics
Source Processing Threat Analytics Platform UI/Visual/Report
11

More Related Content

PPTX
Data Aggregation, Curation and analytics for security and situational awareness
PPTX
Extending Hortonworks with Oracle's Big Data Platform
PPTX
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
PDF
Oracle Solaris Secure Cloud Infrastructure
PDF
Big Data at Oracle - Strata 2015 San Jose
PPTX
ING's Customer-Centric Data Journey from Community Idea to Private Cloud Depl...
PPTX
Spark and Hadoop Perfect Togeher by Arun Murthy
PDF
Dataguise hortonworks insurance_feb25
Data Aggregation, Curation and analytics for security and situational awareness
Extending Hortonworks with Oracle's Big Data Platform
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
Oracle Solaris Secure Cloud Infrastructure
Big Data at Oracle - Strata 2015 San Jose
ING's Customer-Centric Data Journey from Community Idea to Private Cloud Depl...
Spark and Hadoop Perfect Togeher by Arun Murthy
Dataguise hortonworks insurance_feb25

What's hot (20)

PDF
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
PDF
Hortonworks, Novetta and Noble Energy Webinar
PPTX
Data Science at Speed. At Scale.
PDF
Hadoop Crash Course
PDF
Hybrid Cloud Strategy for Big Data and Analytics
PPTX
Expand a Data warehouse with Hadoop and Big Data
PDF
Social Media Monitoring with NiFi, Druid and Superset
PDF
Real-time Analytics in Financial: Use Case, Architecture and Challenges
PPTX
Security, ETL, BI & Analytics, and Software Integration
PDF
Hortonworks - IBM Cognitive - The Future of Data Science
PDF
Hadoop Summit Tokyo HDP Sandbox Workshop
PPTX
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
PPTX
Swimming Across the Data Lake, Lessons learned and keys to success
PDF
3 CTOs Discuss the Shift to Next-Gen Analytic Ecosystems
PDF
Apache Hadoop Crash Course - HS16SJ
PPTX
Automatic Detection, Classification and Authorization of Sensitive Personal D...
PDF
Beyond Big Data: Data Science and AI
PPTX
Oracle's BigData solutions
PDF
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
PPTX
The Challenge of Driving Business Value from the Analytics of Things (AOT)
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
Hortonworks, Novetta and Noble Energy Webinar
Data Science at Speed. At Scale.
Hadoop Crash Course
Hybrid Cloud Strategy for Big Data and Analytics
Expand a Data warehouse with Hadoop and Big Data
Social Media Monitoring with NiFi, Druid and Superset
Real-time Analytics in Financial: Use Case, Architecture and Challenges
Security, ETL, BI & Analytics, and Software Integration
Hortonworks - IBM Cognitive - The Future of Data Science
Hadoop Summit Tokyo HDP Sandbox Workshop
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Swimming Across the Data Lake, Lessons learned and keys to success
3 CTOs Discuss the Shift to Next-Gen Analytic Ecosystems
Apache Hadoop Crash Course - HS16SJ
Automatic Detection, Classification and Authorization of Sensitive Personal D...
Beyond Big Data: Data Science and AI
Oracle's BigData solutions
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
The Challenge of Driving Business Value from the Analytics of Things (AOT)
Ad

Viewers also liked (15)

PPTX
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
PPT
Stream data mining & CluStream framework
PPTX
Knowledge from Noise
PPTX
Apache Accumulo 1.8.0 Overview
PPTX
SQRRL threat hunting platform
PPTX
HDFS Tiered Storage
PDF
Distributed Decision Tree Learning for Mining Big Data Streams
PDF
Introduction to Accumulo
PPTX
Big data advance topics - part 2.pptx
PDF
Real-Time Anomoly Detection with Spark MLib, Akka and Cassandra by Natalino Busa
PDF
HDFS Analysis for Small Files
PPTX
Analysis of Major Trends in Big Data Analytics
PPT
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
PPTX
2017 02-07 - elastic & spark. building a search geo locator
PPTX
The Impala Cookbook
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Stream data mining & CluStream framework
Knowledge from Noise
Apache Accumulo 1.8.0 Overview
SQRRL threat hunting platform
HDFS Tiered Storage
Distributed Decision Tree Learning for Mining Big Data Streams
Introduction to Accumulo
Big data advance topics - part 2.pptx
Real-Time Anomoly Detection with Spark MLib, Akka and Cassandra by Natalino Busa
HDFS Analysis for Small Files
Analysis of Major Trends in Big Data Analytics
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
2017 02-07 - elastic & spark. building a search geo locator
The Impala Cookbook
Ad

Similar to Near Real-Time Outlier Detection and Interpretation (20)

PPT
Managing the Cyberthreat Landscape
PPTX
Cyber Threat Detection and Interpretation
PPT
Firewall Webinar
PPTX
Securing the Internet of Things: What the CEO Needs to Know
PPTX
At&t cybersecurity introduction with alien vault
PPTX
Not If, But When: A CEO's Guide to Cyberbreach Response
PPTX
The CEO’s Guide to Cyberbreach Response
PDF
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
PPTX
Getting Your Piece of the Mobile Pi 2017
PDF
CORD: Central Office Re-architected as a Datacenter
PDF
Blackhat - Do you trust your Threat Intelligence
PDF
June 27 top_10_techtrends_dcearley_176465
PDF
Gartner Top 10 Strategic Technology Trends 2016
PDF
Gartner: Top 10 Strategic Technology Trends 2016
PDF
Jason Yu, AT&T
PDF
ATT: The Power of the Platform
PPTX
Ben goodman cybersecurity in the iiot
PPT
Enterprise Global Messaging
PDF
AT&T API Platform
PDF
AT&T Competitive Analysis
Managing the Cyberthreat Landscape
Cyber Threat Detection and Interpretation
Firewall Webinar
Securing the Internet of Things: What the CEO Needs to Know
At&t cybersecurity introduction with alien vault
Not If, But When: A CEO's Guide to Cyberbreach Response
The CEO’s Guide to Cyberbreach Response
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
Getting Your Piece of the Mobile Pi 2017
CORD: Central Office Re-architected as a Datacenter
Blackhat - Do you trust your Threat Intelligence
June 27 top_10_techtrends_dcearley_176465
Gartner Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
Jason Yu, AT&T
ATT: The Power of the Platform
Ben goodman cybersecurity in the iiot
Enterprise Global Messaging
AT&T API Platform
AT&T Competitive Analysis

More from DataWorks Summit/Hadoop Summit (20)

PPT
Running Apache Spark & Apache Zeppelin in Production
PPT
State of Security: Apache Spark & Apache Zeppelin
PDF
Unleashing the Power of Apache Atlas with Apache Ranger
PDF
Enabling Digital Diagnostics with a Data Science Platform
PDF
Revolutionize Text Mining with Spark and Zeppelin
PDF
Double Your Hadoop Performance with Hortonworks SmartSense
PDF
Data Science Crash Course
PDF
Apache Spark Crash Course
PDF
Dataflow with Apache NiFi
PPTX
Schema Registry - Set you Data Free
PPTX
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
PDF
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
PPTX
Mool - Automated Log Analysis using Data Science and ML
PPTX
How Hadoop Makes the Natixis Pack More Efficient
PPTX
HBase in Practice
PDF
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
PPTX
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
PPTX
Backup and Disaster Recovery in Hadoop
PPTX
Scaling HDFS to Manage Billions of Files with Distributed Storage Schemes
PPTX
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
Running Apache Spark & Apache Zeppelin in Production
State of Security: Apache Spark & Apache Zeppelin
Unleashing the Power of Apache Atlas with Apache Ranger
Enabling Digital Diagnostics with a Data Science Platform
Revolutionize Text Mining with Spark and Zeppelin
Double Your Hadoop Performance with Hortonworks SmartSense
Data Science Crash Course
Apache Spark Crash Course
Dataflow with Apache NiFi
Schema Registry - Set you Data Free
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Mool - Automated Log Analysis using Data Science and ML
How Hadoop Makes the Natixis Pack More Efficient
HBase in Practice
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
Backup and Disaster Recovery in Hadoop
Scaling HDFS to Manage Billions of Files with Distributed Storage Schemes
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
August Patch Tuesday
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
DOCX
search engine optimization ppt fir known well about this
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Architecture types and enterprise applications.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Chapter 5: Probability Theory and Statistics
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
August Patch Tuesday
Group 1 Presentation -Planning and Decision Making .pptx
search engine optimization ppt fir known well about this
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Architecture types and enterprise applications.pdf
1 - Historical Antecedents, Social Consideration.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
Enhancing emotion recognition model for a student engagement use case through...
Univ-Connecticut-ChatGPT-Presentaion.pdf
DP Operators-handbook-extract for the Mautical Institute
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Benefits of Physical activity for teenagers.pptx
Chapter 5: Probability Theory and Statistics

Near Real-Time Outlier Detection and Interpretation

  • 1. © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. June 28, 2016 Near Real-time Outlier Detection and Interpretation An Hadoop Based Approach Hadoop Summit 2016 Bob Thorman Principal – Technology Security AT&T Chief Security Organization
  • 2. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. 2 Presentation Outline: Brief Context of the Problem of Cyber Threats in our industry Recent History of AT&T Cyber Threat Capabilities Hadoop Based Approach to Threat Analytics Platform Cyber Threat Detection and Interpretation Insider Threat
  • 3. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. The Problem of Cyber Threats in Our Industry A Brief Context
  • 4. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. 4 Network Scale • ~1M Authenticated users • ~800K user oriented devices • ~1100 security devices on the network (FW, IDS, etc.) • Approximately 5B network events per day – Firewall, Proxy, IDS, SIEM, etc. Facing Alarming Trends Bridging to the Internet • Next Slides The Problem of Cyber Threats in Our Industry
  • 5. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. 5 Distributed Reflection DoS (DrDoS) Attack Evolution Attack activity trending up Oct 2013  1900/udp: SSDP  123/udp: NTP  19/udp: chargen  0/udp: packet fragmentation  53/udp: DNS (some legitimate)30 months shown
  • 6. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. Recent History of AT&T Cyber Threat Protection Capabilities A Need for Big Data
  • 7. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. History of AT&T Cyber Threat Protection Capabilities Chief Security Office – 2002 Program concept for millions of records per day – 2005 Program concept tens of millions of records per day – 2016 Big Data concept for tens of billions events/day – 2017 Big Data concepts for trillions events/day Major Big Data Development Milestone – 2008 Beginnings of Accumulo, an implementation of Google™ Bigtable – 2011 Accumulo open sourced to Apache Software Foundation – 2013 AT&T initiates Threat Analytics modernization project – 2014 AT&T initiates deployment of Hadoop-based Threat Analytics Platform Cyber Threat Protection Platform Architecture Evolution – Next slides 7
  • 8. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. Threat Platform of Yesterday SIEM 8 Source/processing/analytics DBMS/SAN Query
  • 9. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. Threat Detection and Interpretation Process 9 Architectural Component Ingestion Outlier Detection1 Spark Streaming Detectors1 R Analytics1 Web UI Dashboards Custom Alerting Framework1 Threat Operations 1Area of focus for automation
  • 10. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. An Hadoop Based Approach to Threat Analytics Platform Securing AT&T with Hadoop
  • 11. Detecting and Interpreting Cyber Threats at AT&T © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement. Today’s Platform Details Using An Hadoop Based Platform for Log Management, Threat Analysis, Reporting AT&T approach to use of Hadoop in a Threat Analysis Platform SIEM Raw logs Events, Intelligence, Alarms, Threats Results, Reports, Analytics Source Processing Threat Analytics Platform UI/Visual/Report 11

Editor's Notes

  • #2: Introduce Adam Introduce myself
  • #3: Work real quick through agenda Just set the stage for an Hadoop based threat analytics platform that has NRT capabilities
  • #5: Set the stage for how a typical network in this industry and how much work there is for securing it. Presents an industry problem, not an AT&T problem Address the outside threat to the internal operation of our industry
  • #6: Amount of traffic related to reflect based DoS attackers. Illustrates activity on the internet not the attacks against the AT&T perimeter. Hack-ma-geddon Columbia government Spam Hause Syria <- New York Times Target lost 40M credit/debit cards
  • #8: Our TAP has evolved a lot over the last few year as we’ve moved into an Hadoop base architecture. I will briefly describe the roadmap. Proprietary technology and lack of extensibility are killers
  • #9: Past was SIEM dependent, based on large RDBMS and exclusively dependent on human detection and interpretation. Largely a data reduction system. Industry solution of yesterday.
  • #10: The challenge is the cognitive intersection with automation. An environment of innovation. Goal is to automate the security analysis process which are largely cognitive. Granted this is a different use of Hadoop rather than single use data. Its continual ingestion, NRT detections, alerting, etc. Not always a clear problem statement. Spend some time developing the human dependency and cognitive processes Takes a lot of data
  • #12: Left to right, we move all the data through various processing platforms into an Hadoop base system for raw log management, data org, management, access, analysis and finally to visualization and reporting.