SlideShare a Scribd company logo
Solving Cyber at Scale
with Hadoop, Storm and Metron
Simon Elliston Ball
• Product Manager
• Data Scientist
• Elephant herder
• @sireb
Threat Sources
IoT: Mirai
Reports of 1.2 Tbps
500,000 devices at peak
DDoS attacks on Dyn DNS services
Insiders
Ransomware and spears
Who are we up against?
MEECES
Money
Ego
Entertainment
Cause
Entrance (social acceptance)
Status
Big Business
• $tn market
• Access is bought and sold: 5 bitcoin for 100m accounts
• Sharing networks
• Criminals as a Service
• DDoS attacks: cost attackers $5 per hour, defenders ~$40k
Sources:	BT	and	KPMG	Report,	Taking	the	Offensive
Challenges for the Modern SOC
Drowning in
Data
Staff shortage
Long tail problem
What we have now
Silos
Packet
Store
SIEM
Log
Store Forensics Tools
Endpoint Agents
Cases
Threat Intel
UEBA
Anti Virus
Email filter
Rules: Asset or
Liability
Shiny
new tools
Solutions: machine learning! magic!
Triage Automation
Detecting the unknown unknowns
Explaining yourself
The value of real time
Data in Motion: why wait until it’s at rest?
Correct context: the world moved on
Better data = analyst efficiency
Fully enriched data
Real context
Consistency
= faster triage and better coverage
Single View
of Business
& Security
Risks
HR
Finance
Web
Logs
Security
Appliances
Email
Syslogs
Geolocation
Network Data
IoT
Telemetry
Data
Operations
CRM
Longer term data
• Attacks last months
• So should your queryable data
Executable solutions
• Orchestration
• Machine-time response
How to do it
Network Level Taps
Data Sources and Aggregation
Open standards for data models =
more productive data scientists +
shareable models
Business level data sources link
security to real business risk.
Massively scalable
platforms
Solving Cyber at Scale
29 ©	Hortonworks	Inc.	2011	– 2016.	All	Rights	Reserved
Data	Services	and	Integration	Layer
Search	and
Dashboarding	
Portal
Security	Data	
Vault
Community
Analytical
Models
Provisioning,
Management
and	Monitoring
ModulesReal-time	Processing
Cyber	Security	Engine
Telemetry
Parsers Enrichment
Threat
Intel
Alert
Triage
Indexers
and
Writers
Cyber	Security
Stream	Processing	Pipeline
Apache	Metron:	a	framework	for	Big	Data	Driven	cyber	security
Telemetry	Ingest	Buffer
Telemetry
Data	Collectors
Real-time
Enrich	/	Threat
Intel	Streams
Performance
Network
Ingest
Probes
/	OtherMachine	Generated	Logs
(AD,	App	/	Web	Server,
firewall,	VPN,	etc.)
Security	Endpoint	Devices	
(Fireye,	Palo	Alto,
BlueCoat,	etc.)
Network	Data
(PCAP,	Netflow,	Bro,	etc.)
IDS
(Suricata,	Snort,	etc.)
Threat	Intelligence	Feeds
(Soltra,	OpenTaxi,
third-party	feeds)
Telemetry
Data	Sources
Common data platform
• Open Standards drive real use
• Consistent SEMANTIC meaning, not just a type system
Community Development
• http://metron.apache.org
• https://github.com/apache/incubator-metron/
Thank you!
• Apache Metron: http://metron.apache.org
• Twitter: @sireb

More Related Content

PPT
VeriSign iDefense Security Intelligence Services
PDF
Realities of Security in the Cloud
PPTX
Big Data Shouldn't Be Big
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
PDF
TTPs for Threat hunting In Oil Refineries
PDF
Leverage Big Data for Security Intelligence
PPTX
Cloud security live hack - final meetup
PPTX
November 2013 HUG: Cyber Security with Hadoop
VeriSign iDefense Security Intelligence Services
Realities of Security in the Cloud
Big Data Shouldn't Be Big
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
TTPs for Threat hunting In Oil Refineries
Leverage Big Data for Security Intelligence
Cloud security live hack - final meetup
November 2013 HUG: Cyber Security with Hadoop

What's hot (20)

PDF
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
PPTX
Big Data Security Analytics (BDSA) with Randy Franklin
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
PPTX
Digital Velocity 2014: "The Holy Grail of Digital Data Analytics"
PDF
Ransomware ly
PDF
Visualizing Threats: Network Visualization for Cyber Security
PPTX
Automating Splunk at Large Scale with Cloudify
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PDF
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PDF
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
PDF
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
PDF
Hunting: Defense Against The Dark Arts v2
PPTX
Crits new one_dark-goffin
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
PPTX
Cyber Threat Hunting with Phirelight
PDF
El contexto de la integración masiva de datos
PPTX
Threat hunting - Every day is hunting season
PDF
Cybersecurity with AI - Ashrith Barthur
PPTX
MassTLC Opening Slides and Simulation Session
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Big Data Security Analytics (BDSA) with Randy Franklin
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Digital Velocity 2014: "The Holy Grail of Digital Data Analytics"
Ransomware ly
Visualizing Threats: Network Visualization for Cyber Security
Automating Splunk at Large Scale with Cloudify
PHDays 2018 Threat Hunting Hands-On Lab
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
Hunting: Defense Against The Dark Arts v2
Crits new one_dark-goffin
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Cyber Threat Hunting with Phirelight
El contexto de la integración masiva de datos
Threat hunting - Every day is hunting season
Cybersecurity with AI - Ashrith Barthur
MassTLC Opening Slides and Simulation Session
Ad

Similar to Solving Cyber at Scale (20)

PPTX
Solving Cyber at Scale
PPTX
Solving cyber at scale
PPTX
A streaming architecture for Cyber Security - Apache Metron
PPTX
How Data Analytics is Re-defining Modern Era in Cyber Security
PPTX
DEVNET-1166 Open SDN Controller APIs
PPTX
Data data everywhere
PDF
Webinar - Feel Secure with revolutionary OTM Solution
PPTX
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
PDF
Catch a Hacker in Real-Time: Live Visuals of Bots and Bad Guys
PDF
Solving Cybersecurity at Scale
PDF
Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...
PDF
MaaS (Model as a Service): Modern Streaming Data Science with Apache Metron
PDF
MaaS (Model as a Service): Modern Streaming Data Science with Apache Metron (...
PDF
IOT_MODULE_4.pd easy to understand notes
PDF
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
PDF
Applying Cloud Techniques to Address Complexity in HPC System Integrations
PPTX
My Other Computer is a Data Center (2010 v21)
PDF
Fog Computing Deep Learning And Big Data Analyticsresearch Directions 1st Ed ...
PDF
Security Analytics with OpenSearch
PDF
System Support for Internet of Things
Solving Cyber at Scale
Solving cyber at scale
A streaming architecture for Cyber Security - Apache Metron
How Data Analytics is Re-defining Modern Era in Cyber Security
DEVNET-1166 Open SDN Controller APIs
Data data everywhere
Webinar - Feel Secure with revolutionary OTM Solution
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Catch a Hacker in Real-Time: Live Visuals of Bots and Bad Guys
Solving Cybersecurity at Scale
Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...
MaaS (Model as a Service): Modern Streaming Data Science with Apache Metron
MaaS (Model as a Service): Modern Streaming Data Science with Apache Metron (...
IOT_MODULE_4.pd easy to understand notes
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
Applying Cloud Techniques to Address Complexity in HPC System Integrations
My Other Computer is a Data Center (2010 v21)
Fog Computing Deep Learning And Big Data Analyticsresearch Directions 1st Ed ...
Security Analytics with OpenSearch
System Support for Internet of Things
Ad

More from DataWorks Summit (20)

PPTX
Data Science Crash Course
PPTX
Floating on a RAFT: HBase Durability with Apache Ratis
PPTX
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
PDF
HBase Tales From the Trenches - Short stories about most common HBase operati...
PPTX
Optimizing Geospatial Operations with Server-side Programming in HBase and Ac...
PPTX
Managing the Dewey Decimal System
PPTX
Practical NoSQL: Accumulo's dirlist Example
PPTX
HBase Global Indexing to support large-scale data ingestion at Uber
PPTX
Scaling Cloud-Scale Translytics Workloads with Omid and Phoenix
PPTX
Supporting Apache HBase : Troubleshooting and Supportability Improvements
PPTX
Security Framework for Multitenant Architecture
PDF
Presto: Optimizing Performance of SQL-on-Anything Engine
PPTX
Introducing MlFlow: An Open Source Platform for the Machine Learning Lifecycl...
PPTX
Extending Twitter's Data Platform to Google Cloud
PPTX
Event-Driven Messaging and Actions using Apache Flink and Apache NiFi
PPTX
Securing Data in Hybrid on-premise and Cloud Environments using Apache Ranger
PPTX
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
PDF
Computer Vision: Coming to a Store Near You
PPTX
Big Data Genomics: Clustering Billions of DNA Sequences with Apache Spark
PPTX
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Data Science Crash Course
Floating on a RAFT: HBase Durability with Apache Ratis
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFi
HBase Tales From the Trenches - Short stories about most common HBase operati...
Optimizing Geospatial Operations with Server-side Programming in HBase and Ac...
Managing the Dewey Decimal System
Practical NoSQL: Accumulo's dirlist Example
HBase Global Indexing to support large-scale data ingestion at Uber
Scaling Cloud-Scale Translytics Workloads with Omid and Phoenix
Supporting Apache HBase : Troubleshooting and Supportability Improvements
Security Framework for Multitenant Architecture
Presto: Optimizing Performance of SQL-on-Anything Engine
Introducing MlFlow: An Open Source Platform for the Machine Learning Lifecycl...
Extending Twitter's Data Platform to Google Cloud
Event-Driven Messaging and Actions using Apache Flink and Apache NiFi
Securing Data in Hybrid on-premise and Cloud Environments using Apache Ranger
Big Data Meets NVM: Accelerating Big Data Processing with Non-Volatile Memory...
Computer Vision: Coming to a Store Near You
Big Data Genomics: Clustering Billions of DNA Sequences with Apache Spark
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing

Solving Cyber at Scale