SlideShare a Scribd company logo
© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Detecting and Profiling Hidden
Threats using Deception and Splunk
Satnam Singh
Chief Data Scientist,
Acalvio Technologies
Oct 2, 2018
© 2018 SPLUNK INC.
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward-looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United
States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2018 Splunk Inc. All rights reserved.
Forward-Looking Statements
© 2018 SPLUNK INC.
Agenda
▶ Hidden threats
▶ Introduction to deception and use cases
▶ Triage of deceptive alerts with security events in Splunk
▶ Profiling threats: Demo
© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Hidden Threats
▶ Adversaries move within the network to find
valuable or vulnerable assets
▶ Perimeter-based controls can’t detect the
threats that have already infiltrated and are
hiding within the enterprise network
▶ Adversaries are using “living off the land”
tactics makes it difficult for Endpoint
detection tools to detect them
© 2018 SPLUNK INC.
How to Defend?
1. Slowdown the
Attacker
2. Speed up the
Defender
© 2018 SPLUNK INC.
Deception
▶ Deception needs to
blend with the
environment
▶ Multiple types of
Deception
▶ Deception needs to
dynamic, morph and
adapt over time
© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Deceptive Security - Use Cases
▶ Detect Lateral Movement in the Corporate Network
▶ Detect Network Scans, Ransomware
▶ Detect advanced threats that are targeting specific verticals
e.g., SWIFT, ICS
© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Deceptive Security - Use Cases
▶ Get visibility of threats in unmanaged networks, encrypted
traffic, IOT devices
▶ Generate actionable threat intelligence with high fidelity alerts
▶ Need only a few resources to deploy another security layer
© 2018 SPLUNK INC.
Deception Types
LURES
DECOYS
BREADCRUMBS
© 2018 SPLUNK INC.
▶ Interaction Types - Low, Medium, High
▶ Services - SSH, Telnet, SMB, FTP, …
▶ Workstations
▶ Databases
▶ Servers
▶ Routers, Switches
▶ …
Decoys
© 2018 SPLUNK INC.
Extends deception to production
devices
▶ Credentials - Shares, Servers
▶ In-Memory hashes
▶ Files
▶ Registry entries
▶ Browser Cookies
▶ …
Breadcrumbs
© 2018 SPLUNK INC.
Makes deceptions more attractive
▶ Vulnerable Shares
▶ Network Printer
▶ Vulnerable Webserver
▶ PACS DICOM Server
▶ Contents of breadcrumbs and
decoys (ex: files, user account,
share, database, address book)
▶ ….
Lures & Baits
© 2018 SPLUNK INC.
Deception Farms
Threat Analysis
Engine
AI
Engines
Sensor
Sensor
Enterprise Network
On-premises
SERVER
SOFTWARE
TUNNELS
Network 1
VPC 1
Projections
Projections
SERVER
SDN
Fabric
Cloud VPC
Acalvio Deception
Farm
VPC 1
Network 1
SERVER
SERVER
© 2018 SPLUNK INC.
Fluid Deception
A3
HI
A4
A5
A6
LI
SDN
Fabric
A1 A2
Sensor
A3
Low Interaction Deceptions
High Interaction Deceptions
ATTACK
B4
A4 A5 A6
Acalvio Deception Farm
B1 B2 B3
SOFTWARE TUNNEL
Enterprise Network
On-premises
Projected
Deceptions
© 2018 SPLUNK INC.© 2018 SPLUNK INC.
Threat Profiling
3. Triage with
Deception Alerts
1. Customise Deception
- Customise decoys to blend
- Determine Deception Strategy
Splunk
App
2. Deception Platform
Deploy Deceptions
© 2018 SPLUNK INC.
Demo
Threat Profiling
© 2018 SPLUNK INC.
1. Deception provides an ability to detect
hidden threats
2. Deception needs to be customized and
dynamic
3. Triage deception alerts with network,
endpoint logs in Splunk to generate
actionable internal threat intelligence
Key
Takeaways

More Related Content

PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
PPTX
GDPR Complaince: Don't Let SIEM BE Your Downfall
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PDF
5 Mobile App Security MUST-DOs in 2018
PDF
It's not about you: Mobile security in 2016
PPTX
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
PDF
Splunk ITOA Roundtable - Zurich: 30th November 2017
PDF
Preparing for the inevitable: The mobile incident response playbook
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
GDPR Complaince: Don't Let SIEM BE Your Downfall
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
5 Mobile App Security MUST-DOs in 2018
It's not about you: Mobile security in 2016
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
Splunk ITOA Roundtable - Zurich: 30th November 2017
Preparing for the inevitable: The mobile incident response playbook

What's hot (20)

PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PDF
How to scale mobile application security testing
PDF
Splunk Threat Hunting Workshop
PDF
Netskope Overview
PDF
Cisco Cybersecurity #10YearChallenge
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PDF
Android P Security Updates: What You Need to Know
PDF
How to make Android apps secure: dos and don’ts
PDF
A Risk-Based Mobile App Security Testing Strategy
PDF
Shifting left: Continuous testing for better app quality and security
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
SplunkLive! Warsaw 2016 - Splunk for Security
PDF
SOCIAL MEDIA AS A CYBER WEAPON
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Talk1 esc7 muscl-dataprotection_v1_2
PDF
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PPTX
Getting Started with Splunk Enterprise
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
How to scale mobile application security testing
Splunk Threat Hunting Workshop
Netskope Overview
Cisco Cybersecurity #10YearChallenge
Splunk Discovery Day Dubai 2017 - Security Keynote
Android P Security Updates: What You Need to Know
How to make Android apps secure: dos and don’ts
A Risk-Based Mobile App Security Testing Strategy
Shifting left: Continuous testing for better app quality and security
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
SplunkLive! Warsaw 2016 - Splunk for Security
SOCIAL MEDIA AS A CYBER WEAPON
What attackers know about your mobile apps that you don’t: Banking & FinTech
Talk1 esc7 muscl-dataprotection_v1_2
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
Getting Started with Splunk Enterprise
DATA LOSS PREVENTION OVERVIEW
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
Ad

Similar to Using Deception to Detect and Profile Hidden Threats (20)

PDF
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
PDF
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
PPTX
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
PDF
March 2023 PNW User Group
PPTX
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PDF
SplunkLive! Wien - Splunk für Security
PDF
SplunkLive! Zürich - Splunk für Security
PDF
Splunk Solution overview testing versi 1
PPTX
Security investigation hands-on workshop 2018
PPTX
Security investigation hands on workshop 2018-05
PDF
SplunkLive! München 2016 - Splunk für Security
PDF
PSUG 7 - 2025-06-03 - David Bianco on Splunk SURGe
PPTX
Security crawl walk run presentation mckay v1 2017
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PDF
Splunk Webinar Best Practices für Incident Investigation
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PPTX
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
PDF
2022 09 March Splunk PNW User Group
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
March 2023 PNW User Group
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Webinar: Neues zur Splunk App for Enterprise Security
SplunkLive! Wien - Splunk für Security
SplunkLive! Zürich - Splunk für Security
Splunk Solution overview testing versi 1
Security investigation hands-on workshop 2018
Security investigation hands on workshop 2018-05
SplunkLive! München 2016 - Splunk für Security
PSUG 7 - 2025-06-03 - David Bianco on Splunk SURGe
Security crawl walk run presentation mckay v1 2017
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk Webinar Best Practices für Incident Investigation
Build a Security Portfolio That Strengthens Your Security Posture
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
2022 09 March Splunk PNW User Group
Ad

More from Satnam Singh (10)

PDF
InfoSec Deep Learning in Action
PDF
Probabilistic signals and systems satnam singh
PDF
A Game between Adversary and AI Scientist
PDF
Deep learning fundamentals workshop
PPTX
Deception-Triggered Security Data Science to Detect Adversary Movements
PDF
AI for CyberSecurity
PPTX
HawkEye : A Real-time Anomaly Detection System
PPTX
India software developers conference 2013 Bangalore
PDF
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
PDF
Big Data Analytics Insights Conference- Satnam
InfoSec Deep Learning in Action
Probabilistic signals and systems satnam singh
A Game between Adversary and AI Scientist
Deep learning fundamentals workshop
Deception-Triggered Security Data Science to Detect Adversary Movements
AI for CyberSecurity
HawkEye : A Real-time Anomaly Detection System
India software developers conference 2013 Bangalore
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
Big Data Analytics Insights Conference- Satnam

Recently uploaded (20)

PPTX
Supervised vs unsupervised machine learning algorithms
PDF
Introduction to the R Programming Language
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
1_Introduction to advance data techniques.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
annual-report-2024-2025 original latest.
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PDF
Introduction to Data Science and Data Analysis
PDF
Fluorescence-microscope_Botany_detailed content
Supervised vs unsupervised machine learning algorithms
Introduction to the R Programming Language
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
1_Introduction to advance data techniques.pptx
climate analysis of Dhaka ,Banglades.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
ISS -ESG Data flows What is ESG and HowHow
Galatica Smart Energy Infrastructure Startup Pitch Deck
SAP 2 completion done . PRESENTATION.pptx
annual-report-2024-2025 original latest.
STUDY DESIGN details- Lt Col Maksud (21).pptx
Miokarditis (Inflamasi pada Otot Jantung)
IBA_Chapter_11_Slides_Final_Accessible.pptx
Reliability_Chapter_ presentation 1221.5784
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Data_Analytics_and_PowerBI_Presentation.pptx
Clinical guidelines as a resource for EBP(1).pdf
Introduction to Data Science and Data Analysis
Fluorescence-microscope_Botany_detailed content

Using Deception to Detect and Profile Hidden Threats

  • 1. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Detecting and Profiling Hidden Threats using Deception and Splunk Satnam Singh Chief Data Scientist, Acalvio Technologies Oct 2, 2018
  • 2. © 2018 SPLUNK INC. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward-looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2018 Splunk Inc. All rights reserved. Forward-Looking Statements
  • 3. © 2018 SPLUNK INC. Agenda ▶ Hidden threats ▶ Introduction to deception and use cases ▶ Triage of deceptive alerts with security events in Splunk ▶ Profiling threats: Demo
  • 4. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Hidden Threats ▶ Adversaries move within the network to find valuable or vulnerable assets ▶ Perimeter-based controls can’t detect the threats that have already infiltrated and are hiding within the enterprise network ▶ Adversaries are using “living off the land” tactics makes it difficult for Endpoint detection tools to detect them
  • 5. © 2018 SPLUNK INC. How to Defend? 1. Slowdown the Attacker 2. Speed up the Defender
  • 6. © 2018 SPLUNK INC. Deception ▶ Deception needs to blend with the environment ▶ Multiple types of Deception ▶ Deception needs to dynamic, morph and adapt over time
  • 7. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Deceptive Security - Use Cases ▶ Detect Lateral Movement in the Corporate Network ▶ Detect Network Scans, Ransomware ▶ Detect advanced threats that are targeting specific verticals e.g., SWIFT, ICS
  • 8. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Deceptive Security - Use Cases ▶ Get visibility of threats in unmanaged networks, encrypted traffic, IOT devices ▶ Generate actionable threat intelligence with high fidelity alerts ▶ Need only a few resources to deploy another security layer
  • 9. © 2018 SPLUNK INC. Deception Types LURES DECOYS BREADCRUMBS
  • 10. © 2018 SPLUNK INC. ▶ Interaction Types - Low, Medium, High ▶ Services - SSH, Telnet, SMB, FTP, … ▶ Workstations ▶ Databases ▶ Servers ▶ Routers, Switches ▶ … Decoys
  • 11. © 2018 SPLUNK INC. Extends deception to production devices ▶ Credentials - Shares, Servers ▶ In-Memory hashes ▶ Files ▶ Registry entries ▶ Browser Cookies ▶ … Breadcrumbs
  • 12. © 2018 SPLUNK INC. Makes deceptions more attractive ▶ Vulnerable Shares ▶ Network Printer ▶ Vulnerable Webserver ▶ PACS DICOM Server ▶ Contents of breadcrumbs and decoys (ex: files, user account, share, database, address book) ▶ …. Lures & Baits
  • 13. © 2018 SPLUNK INC. Deception Farms Threat Analysis Engine AI Engines Sensor Sensor Enterprise Network On-premises SERVER SOFTWARE TUNNELS Network 1 VPC 1 Projections Projections SERVER SDN Fabric Cloud VPC Acalvio Deception Farm VPC 1 Network 1 SERVER SERVER
  • 14. © 2018 SPLUNK INC. Fluid Deception A3 HI A4 A5 A6 LI SDN Fabric A1 A2 Sensor A3 Low Interaction Deceptions High Interaction Deceptions ATTACK B4 A4 A5 A6 Acalvio Deception Farm B1 B2 B3 SOFTWARE TUNNEL Enterprise Network On-premises Projected Deceptions
  • 15. © 2018 SPLUNK INC.© 2018 SPLUNK INC. Threat Profiling 3. Triage with Deception Alerts 1. Customise Deception - Customise decoys to blend - Determine Deception Strategy Splunk App 2. Deception Platform Deploy Deceptions
  • 16. © 2018 SPLUNK INC. Demo Threat Profiling
  • 17. © 2018 SPLUNK INC. 1. Deception provides an ability to detect hidden threats 2. Deception needs to be customized and dynamic 3. Triage deception alerts with network, endpoint logs in Splunk to generate actionable internal threat intelligence Key Takeaways