security event management: challenges and opportunities · rule generation. rule matching. few...

37
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Security Event Management: Challenges and Opportunities Pratyusa K. Manadhata HP Labs [email protected]

Upload: others

Post on 21-Aug-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Security Event Management: Challenges and Opportunities

Pratyusa K. ManadhataHP [email protected]

Page 2: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2

Enterprise Security: Point products

Page 3: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3

Security information and event management systems (SIEM)

IDS AntiVirus

Proxy

IDS

FirewallUnified UIFalse positive reduction

Page 4: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4

SIEM architecture

Page 5: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5

Management platform

Rule GenerationRule Matching

Few hours’ data

~10K eps Alerts

Rules

Page 6: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6

Security operations center (SOC)

Commodity attacks

Targeted attacks

$

$$$$

Tier 1 SA

IDS

Firewall

Proxy

Tier 2 SA

Tier 3 SA

Esca

lati

on

Seve

rity

of A

ttac

k

Tim

e an

d co

st

SIEM Alerts

Page 7: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7

An HP SOC

Hundreds of connector servers

A few hundred forensic DBs

Multiple management platforms

Page 8: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8

The reality

3 000 000 000 events/day

20 analysts

Page 9: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9

Operational challenges

Implementing rules – balancing FPs and FNs

Lack of context

Page 10: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10

Challenge: Drinking from a firehose

Minutes to decide if an alert or event needs further attention

Page 11: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11

Challenge: Getting value out of data

AV

DLPFire-wall

IDS

AV

DLPFire-wall

IDS

LDAP

DHCP

DNS

HTTP

Page 12: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12

Why enterprises collect security data

Big Data

Compliance

ForensicsCheaper Storage

Page 13: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13

Research opportunity

Algorithms and systems to identify actionable

security information from event data

Page 14: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14

Research opportunity

Better Enterprise Security

Better Security Products

Improve SOC Workflow

Page 15: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15

Data-driven security products

AV/IDS/Firewall/.. Signatures/Rules/..

Page 16: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16

Anti-malware evolution

Static Analysis Dynamic Analysis

Data analysis: feature extraction/learning/classification/..

Reputation Analysis

Page 17: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17

On-Premises analysis

On-site analysis

Fine-grained behavior data

Hardware and virtualization

progress enable scaling

Page 18: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18

Research opportunity

What can we infer from event logs?

How do they compare to on-premises analysis?

Page 19: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19

Data collection and storage

Legal, Privacy, Logistics

Input Validation Storage Cost vs. Data

Requirements

Page 20: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20

Scalable analysis

Work with human analysts, not replace them

Things that we took for granted are not true any more

Page 21: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21

Infer human intent from machine logs

No definition of bad exists – rely on heuristics

Automation is hard

History is not a good indicator of future

Page 22: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22

Algorithms must learn and evolve

Adversaries adapt

Networks and systems change and fail

People behave unpredictably

Page 23: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23

Beware of false positives

Benign events outnumber malicious events

AccuracyScalability

Page 24: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24

More data = More spurious correlations

Chocolate Consumption, Cognitive Function, and Nobel Laureates, Franz H. Messerli, New England Journal of Medicine, Oct 2012

Page 25: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25

Privacy

Data minimization vs Serendipity

Privacy-utility trade off

Page 26: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.26

Malicious domain detection

Hosts

Domains

nytimes.com16.199.144.23

httpz.ru

unknown.net

Page 27: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27

Estimating marginal probability of being malicious

Hosts

Domains

0.01

0.99

??

??

??

∑ ∑∑ ∑− +

=1 1 1

),..,,(....)(),..,,(

21

21

x x x xni

n

i i n

xxxPxPxxxP

Page 28: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28

Belief propagation algorithm [P82, YFW01]

Marginal probability estimation in graphs• NP-complete

Belief propagation is fast and approximate• Iterative message passing

Page 29: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29

Our approach

Page 30: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30

Message passing

Message(i → j) ∝ (prior, edge potential, incoming messages)

Prior Edge potential Incoming messages

∏∑∈∈

=jiNk

ikijiiSx

jij xmxxxxmi \)(

)(),()()( ψφ

Page 31: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31

Belief computation

Belief(i) ∝ (prior, incoming messages)

PriorNormalization constant Incoming messages

∏∈

=)(

)()()(iNj

ijiiii xmxKxb φ

Page 32: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.32

HTTP Proxy logs

Logs from a large enterprise• 98 HTTP proxy servers, 7 months of data

• 1 day’s logs : 1.29 billion events

• 2.80M nodes and 27.8M edges

Priors from ground truth (1.45% nodes) Edge potential• 21.6K known bad domains: 0.99

• 19.7K known good domains: 0.01

• Unknown hosts and domains: 0.5

Benign Malicious

Benign 0.51 0.49

Malicious 0.49 0.51

Page 33: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.33

Domain detection ROC plot

Page 34: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.34

ROC plots for seven days’ data

Page 35: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.35

Prioritized Alerts

Beehive [Yen et al., ACSAC13]

Normalization

Destination-based

Clustering

Device Timezone Config. IP-Host Mapping

SIEM

Feature extractionHost- based Policy- based Traffic-based

Host-User Mapping

Page 36: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.36

Parting thoughts

A significant Industry problem

Could benefit from academia

Engineering and algorithmic challenges

Page 37: Security Event Management: Challenges and Opportunities · Rule Generation. Rule Matching. Few hours’ data ~10K eps. Alerts. Rules

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank you

[email protected]

Acknowledgements: Jorge Alzati, Sandeep Bhatt, Stuart Haber, William Horne,

Doron Keller, Prasad Rao, and Loai Zomlot