SlideShare una empresa de Scribd logo
1 de 57
Descargar para leer sin conexión
Data-­‐Driven	
  Threat	
  Intelligence:	
  Metrics	
  
on	
  Indicator	
  Dissemination	
  and	
  Sharing	
  
(#ddti)
Alex	
  Pinto
Chief	
  Data	
  Scientist	
  
MLSec Project
@alexcpsec
@MLSecProject
AlexandreSieira
CTO
Niddel
@AlexandreSieira
@NiddelCorp
• Cyber	
  War… Threat	
  Intel	
  –
What	
  is	
  it	
  good	
  for?
• Combine	
  and	
  TIQ-­‐test
• Measuring	
  indicators
• Threat	
  Intelligence	
  Sharing
• Future	
  research	
  direction	
  
(i.e.	
  will	
  work	
  for	
  data)
Agenda
HT	
  to	
  @RCISCwendy
50-­‐ish	
  Slides
3	
  Key	
  Takeaways
2	
  Heartfelt	
  and	
  genuine	
  defenses	
  of	
  Threat	
  
Intelligence	
  Providers
1	
  Prediction	
  on	
  “The	
  Future	
  of	
  Threat	
  
Intelligence	
  Sharing”
Presentation	
  Metrics!!
What	
  is	
  TI	
  good	
  for	
  (1)	
  Attribution
What	
  is	
  TI	
  good	
  for	
  anyway?
TY	
  to	
  @bfist for	
  his	
  work	
  on	
  http://sony.attributed.to
What	
  is	
  TI	
  good	
  for	
  (2)	
  – Cyber	
  Maps!!
TY	
  to	
  @hrbrmstr for	
  his	
  work	
  on
https://github.com/hrbrmstr/pewpew
What	
  is	
  TI	
  good	
  for	
  anyway?
• (3)	
  How	
  about	
  actual	
  defense?	
  
• Strategic	
  and	
  tactical:	
  planning
• Technical	
  indicators:	
  DFIR	
  and	
  monitoring
Affirming	
  the	
  Consequent	
  Fallacy
1. If	
  A,	
  then	
  B.
2. B.
3. Therefore,	
  A.
1. Evil	
  malware	
  talks	
  to	
  8.8.8.8.
2. I	
  see	
  traffic	
  to	
  8.8.8.8.
3. ZOMG,	
  APT!!!
But	
  this	
  is	
  a	
  Data-­‐Driven	
  talk!
Combine	
  and	
  TIQ-­‐Test
• Combine	
  (https://github.com/mlsecproject/combine)
• Gathers	
  TI	
  data	
  (ip/host)	
  from	
  Internet	
  and	
  local	
  files
• Normalizes	
  the	
  data	
  and	
  enriches	
  it	
  (AS	
  /	
  Geo	
  /	
  pDNS)
• Can	
  export	
  to	
  CSV,	
  “tiq-­‐test	
  format”	
  and	
  CRITs
• Coming	
  Soon™:	
  CybOX /	
  STIX	
  /	
  SILK	
  /ArcSight CEF
• TIQ-­‐Test	
  (https://github.com/mlsecproject/tiq-­‐test)
• Runs	
  statistical	
  summaries	
  and	
  tests	
  on	
  TI	
  feeds
• Generates	
  charts	
  based	
  on	
  the	
  tests	
  and	
  summaries
• Written	
  in	
  R	
  (because	
  you	
  should	
  learn	
  a	
  stat	
  language)
• https://github.com/mlsecproject/tiq-­‐test-­‐Summer2015
Using	
  TIQ-­‐TEST	
  – Feeds	
  Selected
• Dataset	
  was	
  separated	
  into	
  “inbound”	
  and	
  “outbound”
TY	
  to	
  @kafeine and	
  John	
  Bambenek for	
  access	
  to	
  their	
  feeds
Using	
  TIQ-­‐TEST	
  – Data	
  Prep
• Extract	
  the	
  “raw”	
  information	
  from	
  indicator	
  feeds
• Both	
  IP	
  addresses	
  and	
  hostnames	
  were	
  extracted
Using	
  TIQ-­‐TEST	
  – Data	
  Prep
• Convert	
  the	
  hostname	
  data	
  to	
  IP	
  addresses:
• Active	
  IP	
  addresses	
  for	
  the	
  respective	
  date	
  (“A”	
  query)
• Passive	
  DNS	
  from	
  Farsight Security	
  (DNSDB)
• For	
  each	
  IP	
  record	
  (including	
  the	
  ones	
  from	
  hostnames):
• Add	
  asnumber and	
  asname (from	
  MaxMind ASN	
  DB)
• Add	
  country (from	
  MaxMind GeoLite DB)
• Add	
  rhost (again	
  from	
  DNSDB)	
  – most	
  popular	
  “PTR”
Using	
  TIQ-­‐TEST	
  – Data	
  Prep	
  Done
Novelty	
  Test
Measuring	
  added	
  and	
  dropped	
  
indicators
Novelty	
  Test	
  -­‐ Inbound
Aging	
  Test
Is	
  anyone	
  cleaning	
  this	
  mess	
  up	
  
eventually?
INBOUND
OUTBOUND
Population	
  Test
• Let	
  us	
  use	
  the	
  ASN	
  and	
  
GeoIP databases	
  that	
  we	
  
used	
  to	
  enrich	
  our	
  data	
  as	
  a	
  
reference	
  of	
  the	
  “true”	
  
population.	
  
• But,	
  but,	
  human	
  beings	
  are	
  
unpredictable!	
  We	
  will	
  
never	
  be	
  able	
  to	
  forecast	
  
this!
Is	
  your	
  sampling	
  poll	
  as	
  random	
  as	
  
you	
  think?
Can	
  we	
  get	
  a	
  better	
  look?
• Statistical	
  inference-­‐based	
  comparison	
  models	
  
(hypothesis	
  testing)
• Exact	
  binomial	
  tests	
  (when	
  we	
  have	
  the	
  “true”	
  pop)
• Chi-­‐squared	
  proportion	
  tests	
  (similar	
  to	
  
independence	
  tests)
Overlap	
  Test
More	
  data	
  can	
  be	
  better,	
  but	
  make	
  
sure	
  it	
  is	
  not	
  the	
  same	
  data
Overlap	
  Test	
  -­‐ Inbound
Overlap	
  Test	
  -­‐ Outbound
Uniqueness	
  Test
Uniqueness	
  Test
• “Domain-­‐based	
  indicators	
  are	
  unique	
  to	
  one	
  list	
  between	
  96.16%	
  and	
  
97.37%”
• “IP-­‐based	
  indicators	
  are	
  unique	
  to	
  one	
  list	
  between	
  82.46%	
  and	
  
95.24%	
  of	
  the	
  time”
I	
  hate	
  quoting	
  myself,	
  but…
Key	
  Takeaway	
  #1
MORE	
  !=	
  BETTER
Threat	
  Intelligence	
  
Indicator	
  Feeds
Threat	
  Intelligence	
  
Program
Key	
  Takeaway	
  #1
Intermission
Key	
  Takeaway	
  #2
Key	
  Takeaway	
  #1
"These	
  are	
  the	
  problems	
  Threat	
  
Intelligence	
  Sharing	
  is	
  here	
  to	
  
solve!”
Right?
Herd	
  Immunity,	
  is	
  it?
Source:
www.vaccines.gov
Herd	
  Immunity…
…	
  would	
  imply	
  that	
  other	
  people	
  in	
  your	
  sharing	
  community	
  being	
  
immune	
  to	
  malware	
  A	
  meant	
  your	
  likelihood	
  of	
  infection	
  from	
  it	
  
wa negligible	
  regardless of	
  controls	
  you	
  applied.
Threat	
  Intelligence	
  Sharing
• How	
  many	
  indicators	
  are	
  being	
  
shared?
• How	
  many	
  members	
  do	
  actually	
  
share	
  and	
  how	
  many	
  just	
  leech?
• Can	
  we	
  measure	
  that?	
  What	
  a	
  
super-­‐deeee-­‐duper	
  idea!
Threat	
  Intelligence	
  Sharing
We	
  would	
  like	
  to	
  thank	
  the	
  kind	
  contribution	
  of	
  data	
  from	
  the	
  fine	
  
folks	
  at	
  Facebook	
  Threat	
  Exchange	
  and	
  Threat	
  Connect…
…	
  and	
  also	
  the	
  sharing	
  communities	
  that	
  chose	
  to	
  remain	
  
anonymous.	
  You	
  know	
  who	
  you	
  are,	
  and	
  we	
  ❤ you	
  too.
Threat	
  Intelligence	
  Sharing	
  – Data
From	
  a	
  period	
  of	
  2015-­‐03-­‐01	
  to	
  2015-­‐05-­‐31:
-­‐ Number	
  of	
  Indicators	
  Shared
§ Per	
  day
§ Per	
  member
Not	
  sharing	
  this	
  data	
  – privacy	
  concerns	
  for	
  
the	
  members	
  and	
  communities
Update	
  frequency	
  chart
OVERLAP	
  SLIDE
OVERLAP	
  SLIDE
UNIQUENESS	
  SLIDE
MATURITY?
“Reddit of	
  
Threat	
  
Intelligence”?
Key	
  Takeaway	
  #1
'How	
  can	
  sharing	
  make	
  me	
  
better	
  understand	
  what	
  are	
  
attacks	
  that	
  “are	
  targeted”	
  and	
  
what	
  are	
  “commodity”?'
Key	
  Takeaway	
  #1
TELEMETRY	
  >	
  CONTENT
Key	
  Takeaway	
  #3
(Also	
  Prediction	
  #1)
More	
  Takeaways	
  (I	
  lied)
• Analyze	
  your	
  data.	
  Extract	
  more	
  value	
  from	
  it!
• If	
  you	
  ABSOLUTELY	
  HAVE	
  TO	
  buy	
  Threat	
  Intelligence	
  
or	
  data,	
  evaluate	
  it	
  first.
• Try	
  the	
  sample	
  data,	
  replicate	
  the	
  experiments:
• https://github.com/mlsecproject/tiq-­‐test-­‐Summer2015
• http://rpubs.com/alexcpsec/tiq-­‐test-­‐Summer2015
• Share	
  data	
  with	
  us.	
  I’ll	
  make	
  sure	
  it	
  gets	
  proper	
  exercise!
Thanks!
• Q&A?
• Feedback!
”The	
  measure	
  of	
  intelligence	
  is	
  the	
  ability	
  to	
  change."	
  
-­‐ Albert	
  Einstein	
  
Alex	
  Pinto	
  
@alexcpsec
@MLSecProject
Alexandre Sieira
@AlexandreSieira
@NiddelCorp

Más contenido relacionado

La actualidad más candente

BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityAlex Pinto
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Alex Pinto
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationAlex Pinto
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption StrategiesJoshua R Nicholson
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responsejeffmcjunkin
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approachchrissanders88
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE - ATT&CKcon
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-huntingTripwire
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big DataRaffael Marty
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 

La actualidad más candente (20)

BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident response
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-hunting
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big Data
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 

Similar a Data-Driven Threat Intelligence Metrics on Indicator Dissemination

Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Alexandre Sieira
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Alexandre Sieira
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiJeremy Li
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science TJ Stalcup
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Chi En (Ashley) Shen
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Harry McLaren
 
Intro to Data Science
Intro to Data ScienceIntro to Data Science
Intro to Data ScienceTJ Stalcup
 
Fairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInFairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInC4Media
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everythingRyan Kovar
 
SuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalSuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalstelligence
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingBlack Cell Ltd.
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriDemi Ben-Ari
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Digital Pragmatism with Business Intelligence, Big Data and Data Visualisation
Digital Pragmatism with Business Intelligence, Big Data and Data VisualisationDigital Pragmatism with Business Intelligence, Big Data and Data Visualisation
Digital Pragmatism with Business Intelligence, Big Data and Data VisualisationJen Stirrup
 

Similar a Data-Driven Threat Intelligence Metrics on Indicator Dissemination (20)

Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy Li
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
 
Intro to Data Science
Intro to Data ScienceIntro to Data Science
Intro to Data Science
 
Fairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInFairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedIn
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
 
SuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalSuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-final
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information Sharing
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-Ari
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Digital Pragmatism with Business Intelligence, Big Data and Data Visualisation
Digital Pragmatism with Business Intelligence, Big Data and Data VisualisationDigital Pragmatism with Business Intelligence, Big Data and Data Visualisation
Digital Pragmatism with Business Intelligence, Big Data and Data Visualisation
 

Último

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Data-Driven Threat Intelligence Metrics on Indicator Dissemination

  • 1. Data-­‐Driven  Threat  Intelligence:  Metrics   on  Indicator  Dissemination  and  Sharing   (#ddti) Alex  Pinto Chief  Data  Scientist   MLSec Project @alexcpsec @MLSecProject AlexandreSieira CTO Niddel @AlexandreSieira @NiddelCorp
  • 2. • Cyber  War… Threat  Intel  – What  is  it  good  for? • Combine  and  TIQ-­‐test • Measuring  indicators • Threat  Intelligence  Sharing • Future  research  direction   (i.e.  will  work  for  data) Agenda HT  to  @RCISCwendy
  • 3. 50-­‐ish  Slides 3  Key  Takeaways 2  Heartfelt  and  genuine  defenses  of  Threat   Intelligence  Providers 1  Prediction  on  “The  Future  of  Threat   Intelligence  Sharing” Presentation  Metrics!!
  • 4. What  is  TI  good  for  (1)  Attribution
  • 5. What  is  TI  good  for  anyway? TY  to  @bfist for  his  work  on  http://sony.attributed.to
  • 6. What  is  TI  good  for  (2)  – Cyber  Maps!! TY  to  @hrbrmstr for  his  work  on https://github.com/hrbrmstr/pewpew
  • 7. What  is  TI  good  for  anyway? • (3)  How  about  actual  defense?   • Strategic  and  tactical:  planning • Technical  indicators:  DFIR  and  monitoring
  • 8. Affirming  the  Consequent  Fallacy 1. If  A,  then  B. 2. B. 3. Therefore,  A. 1. Evil  malware  talks  to  8.8.8.8. 2. I  see  traffic  to  8.8.8.8. 3. ZOMG,  APT!!!
  • 9. But  this  is  a  Data-­‐Driven  talk!
  • 10. Combine  and  TIQ-­‐Test • Combine  (https://github.com/mlsecproject/combine) • Gathers  TI  data  (ip/host)  from  Internet  and  local  files • Normalizes  the  data  and  enriches  it  (AS  /  Geo  /  pDNS) • Can  export  to  CSV,  “tiq-­‐test  format”  and  CRITs • Coming  Soon™:  CybOX /  STIX  /  SILK  /ArcSight CEF • TIQ-­‐Test  (https://github.com/mlsecproject/tiq-­‐test) • Runs  statistical  summaries  and  tests  on  TI  feeds • Generates  charts  based  on  the  tests  and  summaries • Written  in  R  (because  you  should  learn  a  stat  language)
  • 12.
  • 13. Using  TIQ-­‐TEST  – Feeds  Selected • Dataset  was  separated  into  “inbound”  and  “outbound” TY  to  @kafeine and  John  Bambenek for  access  to  their  feeds
  • 14. Using  TIQ-­‐TEST  – Data  Prep • Extract  the  “raw”  information  from  indicator  feeds • Both  IP  addresses  and  hostnames  were  extracted
  • 15. Using  TIQ-­‐TEST  – Data  Prep • Convert  the  hostname  data  to  IP  addresses: • Active  IP  addresses  for  the  respective  date  (“A”  query) • Passive  DNS  from  Farsight Security  (DNSDB) • For  each  IP  record  (including  the  ones  from  hostnames): • Add  asnumber and  asname (from  MaxMind ASN  DB) • Add  country (from  MaxMind GeoLite DB) • Add  rhost (again  from  DNSDB)  – most  popular  “PTR”
  • 16. Using  TIQ-­‐TEST  – Data  Prep  Done
  • 17. Novelty  Test Measuring  added  and  dropped   indicators
  • 19. Aging  Test Is  anyone  cleaning  this  mess  up   eventually?
  • 22. Population  Test • Let  us  use  the  ASN  and   GeoIP databases  that  we   used  to  enrich  our  data  as  a   reference  of  the  “true”   population.   • But,  but,  human  beings  are   unpredictable!  We  will   never  be  able  to  forecast   this!
  • 23.
  • 24. Is  your  sampling  poll  as  random  as   you  think?
  • 25. Can  we  get  a  better  look? • Statistical  inference-­‐based  comparison  models   (hypothesis  testing) • Exact  binomial  tests  (when  we  have  the  “true”  pop) • Chi-­‐squared  proportion  tests  (similar  to   independence  tests)
  • 26.
  • 27. Overlap  Test More  data  can  be  better,  but  make   sure  it  is  not  the  same  data
  • 31. Uniqueness  Test • “Domain-­‐based  indicators  are  unique  to  one  list  between  96.16%  and   97.37%” • “IP-­‐based  indicators  are  unique  to  one  list  between  82.46%  and   95.24%  of  the  time”
  • 32.
  • 33. I  hate  quoting  myself,  but…
  • 34. Key  Takeaway  #1 MORE  !=  BETTER Threat  Intelligence   Indicator  Feeds Threat  Intelligence   Program Key  Takeaway  #1
  • 36.
  • 38. Key  Takeaway  #1 "These  are  the  problems  Threat   Intelligence  Sharing  is  here  to   solve!” Right?
  • 39. Herd  Immunity,  is  it? Source: www.vaccines.gov
  • 40. Herd  Immunity… …  would  imply  that  other  people  in  your  sharing  community  being   immune  to  malware  A  meant  your  likelihood  of  infection  from  it   wa negligible  regardless of  controls  you  applied.
  • 41. Threat  Intelligence  Sharing • How  many  indicators  are  being   shared? • How  many  members  do  actually   share  and  how  many  just  leech? • Can  we  measure  that?  What  a   super-­‐deeee-­‐duper  idea!
  • 42. Threat  Intelligence  Sharing We  would  like  to  thank  the  kind  contribution  of  data  from  the  fine   folks  at  Facebook  Threat  Exchange  and  Threat  Connect… …  and  also  the  sharing  communities  that  chose  to  remain   anonymous.  You  know  who  you  are,  and  we  ❤ you  too.
  • 43. Threat  Intelligence  Sharing  – Data From  a  period  of  2015-­‐03-­‐01  to  2015-­‐05-­‐31: -­‐ Number  of  Indicators  Shared § Per  day § Per  member Not  sharing  this  data  – privacy  concerns  for   the  members  and  communities
  • 45.
  • 46.
  • 51. “Reddit of   Threat   Intelligence”?
  • 52.
  • 53. Key  Takeaway  #1 'How  can  sharing  make  me   better  understand  what  are   attacks  that  “are  targeted”  and   what  are  “commodity”?'
  • 54. Key  Takeaway  #1 TELEMETRY  >  CONTENT Key  Takeaway  #3 (Also  Prediction  #1)
  • 55. More  Takeaways  (I  lied) • Analyze  your  data.  Extract  more  value  from  it! • If  you  ABSOLUTELY  HAVE  TO  buy  Threat  Intelligence   or  data,  evaluate  it  first. • Try  the  sample  data,  replicate  the  experiments: • https://github.com/mlsecproject/tiq-­‐test-­‐Summer2015 • http://rpubs.com/alexcpsec/tiq-­‐test-­‐Summer2015 • Share  data  with  us.  I’ll  make  sure  it  gets  proper  exercise!
  • 56.
  • 57. Thanks! • Q&A? • Feedback! ”The  measure  of  intelligence  is  the  ability  to  change."   -­‐ Albert  Einstein   Alex  Pinto   @alexcpsec @MLSecProject Alexandre Sieira @AlexandreSieira @NiddelCorp