alternatives in analysis · security analytics goal: look for new and alternative ways to analyze...

38
Alternatives in Analysis Mark Ryan del Moral Talabis Secure-DNA

Upload: others

Post on 30-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Alternatives in Analysis

Mark Ryan del Moral

Talabis

Secure-DNA

Page 2: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

High-level overview of the analysis

techniques out there

To help you get started with YOUR

analysis and research by introducing you

to existing tools

Tip of the iceberg – this will be FAST..

Page 3: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

SecurityData

Analysis

Security AnalyticsGOAL: Look for new and

alternative ways to analyze

security data

Page 4: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

As security data collection tools continue

to improve and evolve, the quantity of

data that we collect increases

exponentially

Honeypots and Honeynets

Malware Collectors

Honeyclients

Firewall

IDS/IPS

System/Network devices

Page 5: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

After the cool tools what remains are tons

and tons of data to sift through!

Page 6: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Data is often only as valuable as what the

analysis can shape it into.

Page 7: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Analysis

Page 8: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Time to build up our arsenal of analysis

Tools

Techniques

How? Where?

Page 9: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Though security in itself is a unique field

with unique needs, analysis techniques

often span the boundaries of different

disciplines

Page 10: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 11: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Techniques

Data and Text Mining

Clustering

Machine Learning

Baselining

Visualization

Behavioral Analysis

Game Theory

Page 12: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

R-Project

Weka

Yale (RapidMiner)

Tanagra

FlowTag

Honeysnap

Excel and Access

Orange

Page 13: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 14: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Creating a ‘first-cut’ for further analysis

New Stuff! Honeysnap

The Honeynet Project

Arthur Clune, UK Honeynet Project

Page 15: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 16: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 17: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Data mining is the process of automaticallysearching large volumes of data for patternsText mining is the process of deriving highquality information from text.Applications:

Forensic Analysis

Log analysis

IRC analysis

Sample research:Topical Analysis of IRC hacker chatter through textmining

Page 18: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 19: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 20: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Study of human behaviour

Perfect for:

Analysis hacker behavior and motivation

Sample research:

Study of hacker motivations through IRC

hacker chatter

Page 21: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Classification of objects into different

groups, so that the data in each group

(ideally) share some common trait

Perfect for:

Classification of Attacks

Malware Taxonomy

Finding deviations from logs

Sample application:

Classifying Attacks Using K-Means

Page 22: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 23: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 24: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Pertains to the collection, analysis,

interpretation or explanation, and

presentation of data.

Perfect for:

Executives love stats

Baselines

Page 25: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 26: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

-0.2 -0.1 0.0 0.1 0.2 0.3

-0.2

-0.1

0.0

0.1

0.2

0.3

PC1

PC

2

AlabamaAlaska

Arizona

Arkansas

California

ColoradoConnecticut

Delaware

Florida

Georgia

Hawaii

Idaho

Illinois

Indiana Iowa

Kansas

KentuckyLouisiana

MaineMaryland

Massachusetts

Michigan

Minnesota

Mississippi

Missouri

Montana

Nebraska

Nevada

New Hampshire

New Jersey

New Mexico

New York

North Carolina

North Dakota

Ohio

Oklahoma

Oregon Pennsylvania

Rhode Island

South Carolina

South DakotaTennessee

Texas

Utah

Vermont

Virginia

Washington

West Virginia

Wisconsin

Wyoming

-5 0 5

-50

5

Murder

Assault

UrbanPop

Rape

Page 27: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 28: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Applications:

Analyzing and defending against attacks

Imitate defenses of the human body

Sample research:

Code Breaking using Genetic Algorithm

Genetic Algorithm Approach for Intrusion

Detection

Page 29: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Economics takes a lot from mathematics,

statistics and other disciplines

Perfect for:

All sorts of stuff

Sample research:

Game Theory and Hacker Behaviour

Page 30: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 31: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Picture paints a thousand words

Perfect for:

Attack detection and analysis

New Stuff! FlowTag

Visual tagging

Chris Lee, Georgia Tech

Page 32: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 33: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the
Page 34: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

High level overview of analysis tools and

techiniqes

Made you aware that there are a lot of

things to use out there

To produce good results techniques and

tools could be used together

Page 35: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

A forum where people from different fields

can share data and techniques

Diversity is the Key! Everyone is welcome!

Feel free to talk to me more about this

stuff at: [email protected]

Page 36: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Secure-DNA

Page 37: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the

Machine learning is concerned with the

design and development of algorithms

and techniques that allow computers to

"learn"

Useful for:

Predicting Attacks

Self-learning IDS

Sample research:

Predicting attacks using Support Vector

Machines

Page 38: Alternatives in Analysis · Security Analytics GOAL: Look for new and alternative ways to analyze security data As security data collection tools continue to improve and evolve, the