Top Banner
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ISSA Conference Chris Calvert, CISSP, CISM Director of Solution Innovation
19

Technical track chris calvert-1 30 pm-issa conference-calvert

Aug 13, 2015

Download

Technology

ISSA LA
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Technical track chris calvert-1 30 pm-issa conference-calvert

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

ISSA Conference Chris Calvert, CISSP, CISM – Director of Solution Innovation

Page 2: Technical track chris calvert-1 30 pm-issa conference-calvert

2

My Job Is Innovation So I Own The Buzzword

Slides

(Google Trends Report)

Page 3: Technical track chris calvert-1 30 pm-issa conference-calvert

3

The Security Industry Is Not Catching Enough

Bad GuysMost enterprises remain challenged with missing critical breaches.

of business networks

have traffic going to

known malware hosting

websites (Cisco 2014 Annual Security Report)

229 Days 100%is the median duration of

how long breaches were

present before discovery in

2013(M-Trends Report)

Page 4: Technical track chris calvert-1 30 pm-issa conference-calvert

4

Bad guys know how to stay inside the bell curve.

Why Is This So Hard?

Unknown: Harder to detect

• New behavior

• Goes to an approved place

• Works encrypted

• Authorized Use

• Inside of baseline

• Outside monitored infrastructure

• Matches a signature

• Goes to a bad place

• Works in the clear

• Unauthorized Use

• Outside of baseline

• Within monitored infrastructure

Known: Easier to detect

Page 5: Technical track chris calvert-1 30 pm-issa conference-calvert

5

The Geography Of Security Detection Has

ChangedData flows in many ways – where should we catch and analyze it?

Security

Data

Enterpris

e Data

Context

Data

Data Ocean

Cyber Defense: Real-time

correlation

Known Attack Patterns

Hunt Team: Long term analytics

Unknown Attack Patterns

Operational: Rivers of Data• SIEM and Platform protection

• Attacks analyzed & responded to

Tactical: Streams of Data• Endpoint protection & logs

• Attacks easily detected /

prevented

Strategic: Oceans of Data• Often the missing piece

• Contains important intelligence

Endpoint and Network Security

Signature & Pattern Based

Page 6: Technical track chris calvert-1 30 pm-issa conference-calvert

6

All Data Is Not Equal

And expensive…

• $collect, $process, $analyze, $store,

$manage

You should consider the small

analytics problems first

Collect what matters to solving a

real problem – are all these logs

useful?

The conventional wisdom of collect everything and figure it out later is WRONG!

Page 7: Technical track chris calvert-1 30 pm-issa conference-calvert

7

Basic Context• Asset, Network

• Identity

Advanced Context• Application

• Flow & DPI

Technical Intelligence• Malware Detonation

• IOC Identification

Human

Intelligence• Sentiment

analysis

• Motivation

Adhoc Query• Small dataset

• Basic analysis

Advanced Search• Indicator lists

• Pivot search

Analytical Query• Big Data management

• Analytical datamart

Visualization• Exploratory data

analysis

Reporting• Threat

• Compliance

Scoring• Risk Fidelity

• Profiling

Data Mining• Clustering, Aggregation

• Affinity Grouping

Machine Learning• Classification

• Other Algorithms

Real-time• RT Correlation

• Log Aggregation

Historical Analysis• LT Correlation

• Epidemiology

Statistical Analysis• Distributed R

• Standard deviation

Behavioral• Insider Threat

• Baselining

Fro

nti

er

Understand

Explore

Explain

Detect

Depth => Increase in Effectiveness

Describing the Future of Security DetectionAdding Advanced Analytics

Existing Emerging Advanced Target

Page 8: Technical track chris calvert-1 30 pm-issa conference-calvert

8

What Stopped Us From This Kind Of Analysis?

Page 9: Technical track chris calvert-1 30 pm-issa conference-calvert

9

Analytics Of The Future Relies On Columnar

Retrieval

Compression ClusteringDistributed

Query

Page 10: Technical track chris calvert-1 30 pm-issa conference-calvert

10

Find Needles & Understand Haystacks Using…

Classification - context (asset model, etc…)

Correlation - real-time (ESM) & historical

Clustering – common root cause

Affinity Grouping - relationships in data

Aggregation - assemble attacker profile

Statistical Analysis – reporting & anomalies

Disciplines of Analytics

Page 11: Technical track chris calvert-1 30 pm-issa conference-calvert

11

Visualization Of Big Data – Affinity Group

Business Statement

• Find command and control

infrastructure in your

enterprise

Analytics Statement

• Identify affinity groups

• Investigate anomalous

groupings

1 million events

Anomalous Grouping

Findings from Visualization

• Hierarchical, highly-resilient

C&C infrastructure

This example reveals a command and control infrastructure

Page 12: Technical track chris calvert-1 30 pm-issa conference-calvert

12

Analyzing The Haystack - aka Reporting

Time

Vo

lum

e

Page 13: Technical track chris calvert-1 30 pm-issa conference-calvert

13

Business Statement

• Find sophisticated port scan

activity (distributed, randomized)

Analytics Statement

• Plot multiple months of data on

one scatterplot

Billions of events

Findings from Visualization

• Single multi-week scan from

distributed, internal sources

indicates advanced attacker

This example reveals a low and slow scan

Visualization Of Big Data – Scatterplot

Page 14: Technical track chris calvert-1 30 pm-issa conference-calvert

14

Business Statement

• Find servers talking to

suspicious hosts outside the

network

Analytics Statement

• Plot all suspicious successful

communications and review

Graph filtered from billions of events

Findings from Visualization

• A host communicated w/ suspicious external

website

• Unique in that no other host in the environment has

ever talked to this external website

This example reveals inappropriate communication (bottom 10 phenomenon)

Anomalous Line

Visualization Of Big Data – Anomaly Chart

Page 15: Technical track chris calvert-1 30 pm-issa conference-calvert

15

Exploratory Data Analysis

Analytical Process

• Select a question to answer

• Identify the data that matters

• Reduce the data to a manageable amount

• Structure the problem (clean the data, categorize, normalize,

articulate)

• Conduct formal analysis (data mining, statistics, machine learning)

• Conduct exploration / visualization (root cause analyze and

remove)

• Confirm findings and present results

http://h30499.www3.hp.com/t5/HP-Security-Products-Blog/Important-Questions-for-Big-Security-Data/

Page 16: Technical track chris calvert-1 30 pm-issa conference-calvert

16

Hunt Team - The Way To Operationalize

Analytics

Page 17: Technical track chris calvert-1 30 pm-issa conference-calvert

17

Operational Deception – Honeypot vs.

Deception

Page 18: Technical track chris calvert-1 30 pm-issa conference-calvert

18

Analytical Talent: A Strong Fingerprint Exists

Work in small teams – industry average 10 people

Using tools more sophisticated than a spreadsheet is a qualifier

Analytics personality? - Tom Davenport

• Mindset: #1 intellectually curious more important than any

specific skill

• Desire to learn

• Deep desire for creative assignments

• Major in STEM and minor in liberal arts

• Rigor and discipline are high

• Important work matters to these folks

Page 19: Technical track chris calvert-1 30 pm-issa conference-calvert

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

They’re in there! Let’s find them.