technical track chris calvert-1 30 pm-issa conference-calvert

19
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ISSA Conference Chris Calvert, CISSP, CISM Director of Solution Innovation

Upload: issa-la

Post on 13-Aug-2015

250 views

Category:

Technology


1 download

TRANSCRIPT

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

ISSA Conference Chris Calvert, CISSP, CISM – Director of Solution Innovation

2

My Job Is Innovation So I Own The Buzzword

Slides

(Google Trends Report)

3

The Security Industry Is Not Catching Enough

Bad GuysMost enterprises remain challenged with missing critical breaches.

of business networks

have traffic going to

known malware hosting

websites (Cisco 2014 Annual Security Report)

229 Days 100%is the median duration of

how long breaches were

present before discovery in

2013(M-Trends Report)

4

Bad guys know how to stay inside the bell curve.

Why Is This So Hard?

Unknown: Harder to detect

• New behavior

• Goes to an approved place

• Works encrypted

• Authorized Use

• Inside of baseline

• Outside monitored infrastructure

• Matches a signature

• Goes to a bad place

• Works in the clear

• Unauthorized Use

• Outside of baseline

• Within monitored infrastructure

Known: Easier to detect

5

The Geography Of Security Detection Has

ChangedData flows in many ways – where should we catch and analyze it?

Security

Data

Enterpris

e Data

Context

Data

Data Ocean

Cyber Defense: Real-time

correlation

Known Attack Patterns

Hunt Team: Long term analytics

Unknown Attack Patterns

Operational: Rivers of Data• SIEM and Platform protection

• Attacks analyzed & responded to

Tactical: Streams of Data• Endpoint protection & logs

• Attacks easily detected /

prevented

Strategic: Oceans of Data• Often the missing piece

• Contains important intelligence

Endpoint and Network Security

Signature & Pattern Based

6

All Data Is Not Equal

And expensive…

• $collect, $process, $analyze, $store,

$manage

You should consider the small

analytics problems first

Collect what matters to solving a

real problem – are all these logs

useful?

The conventional wisdom of collect everything and figure it out later is WRONG!

7

Basic Context• Asset, Network

• Identity

Advanced Context• Application

• Flow & DPI

Technical Intelligence• Malware Detonation

• IOC Identification

Human

Intelligence• Sentiment

analysis

• Motivation

Adhoc Query• Small dataset

• Basic analysis

Advanced Search• Indicator lists

• Pivot search

Analytical Query• Big Data management

• Analytical datamart

Visualization• Exploratory data

analysis

Reporting• Threat

• Compliance

Scoring• Risk Fidelity

• Profiling

Data Mining• Clustering, Aggregation

• Affinity Grouping

Machine Learning• Classification

• Other Algorithms

Real-time• RT Correlation

• Log Aggregation

Historical Analysis• LT Correlation

• Epidemiology

Statistical Analysis• Distributed R

• Standard deviation

Behavioral• Insider Threat

• Baselining

Fro

nti

er

Understand

Explore

Explain

Detect

Depth => Increase in Effectiveness

Describing the Future of Security DetectionAdding Advanced Analytics

Existing Emerging Advanced Target

8

What Stopped Us From This Kind Of Analysis?

9

Analytics Of The Future Relies On Columnar

Retrieval

Compression ClusteringDistributed

Query

10

Find Needles & Understand Haystacks Using…

Classification - context (asset model, etc…)

Correlation - real-time (ESM) & historical

Clustering – common root cause

Affinity Grouping - relationships in data

Aggregation - assemble attacker profile

Statistical Analysis – reporting & anomalies

Disciplines of Analytics

11

Visualization Of Big Data – Affinity Group

Business Statement

• Find command and control

infrastructure in your

enterprise

Analytics Statement

• Identify affinity groups

• Investigate anomalous

groupings

1 million events

Anomalous Grouping

Findings from Visualization

• Hierarchical, highly-resilient

C&C infrastructure

This example reveals a command and control infrastructure

12

Analyzing The Haystack - aka Reporting

Time

Vo

lum

e

13

Business Statement

• Find sophisticated port scan

activity (distributed, randomized)

Analytics Statement

• Plot multiple months of data on

one scatterplot

Billions of events

Findings from Visualization

• Single multi-week scan from

distributed, internal sources

indicates advanced attacker

This example reveals a low and slow scan

Visualization Of Big Data – Scatterplot

14

Business Statement

• Find servers talking to

suspicious hosts outside the

network

Analytics Statement

• Plot all suspicious successful

communications and review

Graph filtered from billions of events

Findings from Visualization

• A host communicated w/ suspicious external

website

• Unique in that no other host in the environment has

ever talked to this external website

This example reveals inappropriate communication (bottom 10 phenomenon)

Anomalous Line

Visualization Of Big Data – Anomaly Chart

15

Exploratory Data Analysis

Analytical Process

• Select a question to answer

• Identify the data that matters

• Reduce the data to a manageable amount

• Structure the problem (clean the data, categorize, normalize,

articulate)

• Conduct formal analysis (data mining, statistics, machine learning)

• Conduct exploration / visualization (root cause analyze and

remove)

• Confirm findings and present results

http://h30499.www3.hp.com/t5/HP-Security-Products-Blog/Important-Questions-for-Big-Security-Data/

16

Hunt Team - The Way To Operationalize

Analytics

17

Operational Deception – Honeypot vs.

Deception

18

Analytical Talent: A Strong Fingerprint Exists

Work in small teams – industry average 10 people

Using tools more sophisticated than a spreadsheet is a qualifier

Analytics personality? - Tom Davenport

• Mindset: #1 intellectually curious more important than any

specific skill

• Desire to learn

• Deep desire for creative assignments

• Major in STEM and minor in liberal arts

• Rigor and discipline are high

• Important work matters to these folks

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

They’re in there! Let’s find them.