SlideShare una empresa de Scribd logo
1 de 26
© 2013 IBM CorporationMay 14, 2013
Big Data for CyberSecurity
Anand Ranganathan
Research Staff Member, TJ Watson Research Center
<arangana@us.ibm.com>
Agenda
 Cyber Threats
 IBM Big Data Suite
 Big Data Analytics for CyberSecurity
– Monitor Network Behaviors to detect known and unknown cyber-threats
in Enterprises
– Detect Denial of Service Attacks in large ISPs
– Detect Data-Leakage from organizations
2IB
Cyber-Threats Are Becoming More Sophisticated
3
2011: Year of the Targeted Attack
Source: IBM X-Force®
Research 2011 Trend and Risk Report
JK2012-04-26
Marketing
Services
Online
Gaming
Online
Gaming
Online
Gaming
Online
Gaming
Central
Government
Gaming
Gaming
Internet
Services
Online
Gaming
Online
Gaming
Online
Services
Online
Gaming
IT
Security
Banking
IT
Security
Government
Consulting
IT
Security
Tele-
communic
ations
Enter-
tainment
Consumer
Electronics
Agriculture
Apparel
Insurance
Consulting
Consumer
Electronics
Internet
Services
Central
Govt
Central
Govt
Central
Govt
Attack Type
SQL Injection
URL Tampering
Spear Phishing
3rd
Party Software
DDoS
SecureID
Trojan Software
Unknown
Size of circle estimates relative impact of
breach in terms of cost to business
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Entertainment
Defense
Defense
Defense
Consumer
Electronics
Central
Government Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Consumer
Electronics
National
Police
National
Police
State
Police
State
Police
Police
Gaming
Financial
Market
Online
Services
Consulting
Defense
Heavy
Industry
Entertainment
Banking
2011 Sampling of Security Incidents by Attack Type, Time and Impact
conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
2012: The explosion of breaches continues!
Source: IBM X-Force®
Research 2012 Trend and Risk Report
2012 Sampling of Security Incidents by Attack Type, Time and Impact
Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
A Denial of Service attack that prevents or impairs the use of networks,
systems, or applications by exhausting resources
Malware infection - A virus, worm, Trojan horse, or other code-based
malicious entity that successfully infects a host
A targeted, advanced attack – also known as an advanced persistent
threat (APT) - which is designed to be undetectable.
Loss or theft of technology (laptops, memory sticks, PDAs) which
contain sensitive data; Inadvertent disclosure of data
Defacement - A person gains logical or physical access without
permission and defaces a Web application
Common Cyber Security Risks and Potential Impacts
Loss of Customers
Impact to Brand
Sensitive Data Disclosure
Stolen Intellectual Property
Loss of Data & Productivity
Personal and National Security
Common Security Risks Potential Impacts
Loss of Data or Productivity
Botnets
 Botnet = A network of compromised computers controlled by
the botmaster, ranging in size from hundreds to millions of hosts
 Purpose: denial of service attacks, spam delivery, stealing
credentials and data, compromising control systems, etc.
 Hosts infected by downloads from malicious websites, emailed
executables, web, memory stick, PDF, …
 Bots receive updates and commands from the Command and
Control node and communications are becoming more
sophisticated
7
Botnet Communication
There is need to talk:
 Bots receive updates and
commands from the C&C
node
 Utilize a command and
control structure, through
IRC, HTML, SSL, Twitter, IM
or custom built solutions.
 Botnet communications are
becoming more
sophisticated and harder to
track
– peer-to-peer, distributed vs.
hierarchical control structure
– fast fluxing, name generation
8
C&C
P2P
A Typical Threat Example
9
2
Malicious Web
server sends or
reflects exploit code
<click>
1
Install Malware
Mail-Client
5
Victim
Domain
Name
Server
Spammer
Command
& Control
4 web-page +
3 Follow link
Execute (Spam..)
9
C&C
/ U
pdater IP
Address
Lookup
C
&C
/ U
pdater D
N
6
Remotely Control
Malware
Contact Updater
By IP Address (C&C)7
8
A Typical Threat Example
10
2
Malicious Web
server sends or
reflects exploit code
<click>
1
Install Malware
Mail-Client
5
Victim
Domain
Name
Server
Spammer
Command
& Control
4 web-page +
3 Follow link
Execute (Spam..)
9
C&C
/ U
pdater IP
Address
Lookup
C
&C
/ U
pdater D
N
6
Remotely Control
Malware
Contact Updater
By IP Address (C&C)7
8
d) Monitor Web Traffic
a) Monitor DNS
c) Monitor Port &
Protocol Usage
b) Monitor NetFlowb) Monitor NetFlow
Typical Solution Architecture
11
01/11/10
DNS
NetFlow
…..
X86
Box
X86
Blade
Cell
Blade
X86
Blade
FPGA
Blade
Operating System
TransportSystem S Data Fabric
Unsupervised Real-Time AnalyticsUnsupervised Real-Time Analytics Supervised LearningSupervised Learning
Dashboarding /
Visualization
1
3
2
Real-time Results
(Tickets, Monitoring)
Collect Results +
Evidence
Trends, History
4 Adapted Analytics Models
• Cybersecurity Analytics
• Real-Time processing
of massive data streams
• Advanced Data Mining,
and Trend analytics
• New and Incremental
model learning
PureData System for
Analytics, BigInsights
IBM Confidential © 2012 IBM Corporation12
Smarter Communications
BI /
Reporting
BI / Reporting Exploration /
Visualization
Functional
App
Industry
App
Predictive
Analytics
Content
Analytics
Analytic Applications
IBM Big Data Platform
Systems
Management
Application
Development
Visualization
& Discovery
Accelerators
Information Integration & Governance
Hadoop
System
Stream
Computing
Data
Warehouse
IBM Big Data Suite
IBM Confidential © 2012 IBM Corporation13
IBM InfoSphere Streams
Millions
of
events
per
second
Microse
cond
Latency
Traditional / Non-
traditional
data sources
Real time delivery
Powerful
Analytics
Algo
Trading
Telco churn
predict
Smart
Grid
Cyber
Security
Government /
Law enforcement
ICU
Monitoring
Environment
Monitoring
A Platform for Real Time Analytics on BIG Data
Volume
Terabytes per second
Petabytes per day
Variety
All kinds of data
All kinds of analytics
Velocity Insights in microseconds
Agility
Dynamically responsive
Rapid application development
IBM Confidential © 2012 IBM Corporation14
 continuous ingestion  continuous analysis
How Streams Works
achieve scale by
partitioning applications into components
IBM Confidential © 2012 IBM Corporation15
 continuous ingestion
 continuous analysis
achieve scale
by partitioning applications into components
by distributing across stream-connected hardware nodes
How Streams Works
infrastructure provides services for
scheduling analytics across h/w nodes
establishing streaming connectivity
…
TransformTransform
FilterFilter
ClassifyClassify
CorrelateCorrelate
AnnotateAnnotate
where appropriate,
elements can be “fused” together
for lower communication latencies
Security Appliances (Firewalls, IDS, IPS, SIEMs)
vs Big Data
IBM Big Data PlatformIBM QRadar Security Intelligence Platform
Security use cases Turnkey Custom
User Interface All-in-one console Purpose-built applications
Data Sources 450+ preconfigured (and growing) Everything else
Data Volume 100+ Terabyte range Peta-byte range
Real-time Analysis Seconds Milliseconds
Analytics Pre-built, primarily rule-based Custom, learning
Required Expertise Average - Security practitioners Skilled – Data scientists and analysts
InfoSphere BigInsights,
Streams and PureData
for Analytics
Organizations have a growing need to identify and protect
against threats by building insights from broader and
larger data sets
A Typical Threat Example
20
2
Malicious Web
server sends or
reflects exploit code
<click>
1
Install Malware
Mail-Client
5
Victim
Domain
Name
Server
Spammer
Command
& Control
4 web-page +
3 Follow link
Execute (Spam..)
9
C&C
/ U
pdater IP
Address
Lookup
C
&C
/ U
pdater D
N
6
Remotely Control
Malware
Contact Updater
By IP Address (C&C)7
8
d) Monitor Web Traffic
a) Monitor DNS
c) Monitor Port &
Protocol Usage
b) Monitor NetFlowb) Monitor NetFlow
Traditional Security Analytics
21
Monitored
Network
Monitored
Network
The Rest
Of The
World
DNSDNSDNS
DHCPDHCP
Firewall
IDS/
IPS
Inline
Conventional
Setup
Detect Signatures
within Individual
Data Streams
Streaming Analytics
22
Monitored
Network
Monitored
Network
The Rest
Of The World
(Internet)
DNSDNSDNS
DHCPDHCP
Firewall
IDS/
IPS
Inline
Real-Time Streaming
Analytics Setup
Detect Signatures
within Individual
Data Streams
Real-Time
Cyber Security
Analytics
Detects behaviors by correlating
across diverse & massive data
streams via Analytics in Motion
Models learnt offline with
Analytics on Data at Rest
IDS/IPS Alerts…
Streaming Analytics for Fast-flux Botnets
23
DNS Response
Records
Suspected
Fast-flux
Domain
Names
JoinJoin
DNS Queries
(with internal querying host IP Addresses)
FastFlux
Analytics
FastFlux
Analytics
FastFlux
Analytics
FastFlux
Analytics
FastFlux
Analytics
FastFlux
Analytics
Candidate Names/IP's
with Confidence Values
AggregatorAggregator
Suspected
Fast-Flux
IP-addresses
JoinJoin
DHCP Traffic
(IP  MAC  System/Owner)
Fast-fluxing
Bot alerts
JoinJoin
Host LogsHost Logs
IPS AlertsIPS Alerts
…
Netflow
24
Use Case 2 - Detect Distributed Denial of Service Attacks in
ISPs
 DDOS attacks often launched by botnets to flood a target server
 Often use techniques to amplify the flooding
– E.g. DNS Amplification Attacks
 Very hard to detect and prevent in time
– Need to monitor 100s of Gbps
– Need to monitor millions of DNS requests per second
 Use InfoSphere Streams for running analytics for detecting DDOS
attacks
– Look for anomalies in DNS server requests
– Scale to internet level traffic rates
© 2013 IBM Corporation25
Use Case 3 - Detect Data-Leakage from organizations
 Determine what information employees (or bots) are sending out of
the company
– Look at the all information flowing out of the company to the outside world
– Determine if it contains any confidential or sensitive information
 Monitor what information employees (or bots) are seeing/accessing
– Determine if they are accessing sensitive information (even if they may have
the rights to access it)
– Determine if their access patterns are suddenly changing
• E.g. an employee that is suddenly accessing much more information than he (or
someone else in his role) typically accesses may want to sell this information outside
or leave the company
© 2013 IBM Corporation26
27
DNS Amplification Attack
Key characteristics: 1) Targeted attack victimizing hosts & servers 2) DNS service provider becomes a
participant and unavailable during attack 3) Attack attribution is hard
28
To delete

Más contenido relacionado

Destacado

Tufin overview brochure 2013
Tufin overview brochure 2013Tufin overview brochure 2013
Tufin overview brochure 2013Errol Jayawardene
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференция
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференцияTufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференция
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференцияIT-Integrator
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for CybersecurityVMware Tanzu
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Skybox Security
 
Big data new era of network security analytic dwika
Big data new era of network security analytic dwikaBig data new era of network security analytic dwika
Big data new era of network security analytic dwikaDwika Sudrajat
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchVic Hargrave
 
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...NJVC, LLC
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSightSridhar Karnam
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
SDN & NFV Orchestration
SDN & NFV OrchestrationSDN & NFV Orchestration
SDN & NFV OrchestrationTanto Suratno
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 

Destacado (20)

Tufin overview brochure 2013
Tufin overview brochure 2013Tufin overview brochure 2013
Tufin overview brochure 2013
 
Big Data and Cyber Security
Big Data and Cyber SecurityBig Data and Cyber Security
Big Data and Cyber Security
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференция
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференцияTufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференция
Tufin Orchestration Suite_ИТ-Интегратор_Международная банковская конференция
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Big data new era of network security analytic dwika
Big data new era of network security analytic dwikaBig data new era of network security analytic dwika
Big data new era of network security analytic dwika
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Big Data in Cyber Security
Big Data in Cyber SecurityBig Data in Cyber Security
Big Data in Cyber Security
 
SDN & NFV Orchestration
SDN & NFV OrchestrationSDN & NFV Orchestration
SDN & NFV Orchestration
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 

Más de Swiss Big Data User Group

Making Hadoop based analytics simple for everyone to use
Making Hadoop based analytics simple for everyone to useMaking Hadoop based analytics simple for everyone to use
Making Hadoop based analytics simple for everyone to useSwiss Big Data User Group
 
A real life project using Cassandra at a large Swiss Telco operator
A real life project using Cassandra at a large Swiss Telco operatorA real life project using Cassandra at a large Swiss Telco operator
A real life project using Cassandra at a large Swiss Telco operatorSwiss Big Data User Group
 
Building a Hadoop Data Warehouse with Impala
Building a Hadoop Data Warehouse with ImpalaBuilding a Hadoop Data Warehouse with Impala
Building a Hadoop Data Warehouse with ImpalaSwiss Big Data User Group
 
Closing The Loop for Evaluating Big Data Analysis
Closing The Loop for Evaluating Big Data AnalysisClosing The Loop for Evaluating Big Data Analysis
Closing The Loop for Evaluating Big Data AnalysisSwiss Big Data User Group
 
Big Data and Data Science for traditional Swiss companies
Big Data and Data Science for traditional Swiss companiesBig Data and Data Science for traditional Swiss companies
Big Data and Data Science for traditional Swiss companiesSwiss Big Data User Group
 
Design Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningDesign Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningSwiss Big Data User Group
 
Unleash the power of Big Data in your existing Data Warehouse
Unleash the power of Big Data in your existing Data WarehouseUnleash the power of Big Data in your existing Data Warehouse
Unleash the power of Big Data in your existing Data WarehouseSwiss Big Data User Group
 
Project "Babelfish" - A data warehouse to attack complexity
 Project "Babelfish" - A data warehouse to attack complexity Project "Babelfish" - A data warehouse to attack complexity
Project "Babelfish" - A data warehouse to attack complexitySwiss Big Data User Group
 
Brainserve Datacenter: the High-Density Choice
Brainserve Datacenter: the High-Density ChoiceBrainserve Datacenter: the High-Density Choice
Brainserve Datacenter: the High-Density ChoiceSwiss Big Data User Group
 
Urturn on AWS: scaling infra, cost and time to maket
Urturn on AWS: scaling infra, cost and time to maketUrturn on AWS: scaling infra, cost and time to maket
Urturn on AWS: scaling infra, cost and time to maketSwiss Big Data User Group
 
The World Wide Distributed Computing Architecture of the LHC Datagrid
The World Wide Distributed Computing Architecture of the LHC DatagridThe World Wide Distributed Computing Architecture of the LHC Datagrid
The World Wide Distributed Computing Architecture of the LHC DatagridSwiss Big Data User Group
 
New opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph databaseNew opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph databaseSwiss Big Data User Group
 
Technology Outlook - The new Era of computing
Technology Outlook - The new Era of computingTechnology Outlook - The new Era of computing
Technology Outlook - The new Era of computingSwiss Big Data User Group
 

Más de Swiss Big Data User Group (20)

Making Hadoop based analytics simple for everyone to use
Making Hadoop based analytics simple for everyone to useMaking Hadoop based analytics simple for everyone to use
Making Hadoop based analytics simple for everyone to use
 
A real life project using Cassandra at a large Swiss Telco operator
A real life project using Cassandra at a large Swiss Telco operatorA real life project using Cassandra at a large Swiss Telco operator
A real life project using Cassandra at a large Swiss Telco operator
 
Data Analytics – B2B vs. B2C
Data Analytics – B2B vs. B2CData Analytics – B2B vs. B2C
Data Analytics – B2B vs. B2C
 
SQL on Hadoop
SQL on HadoopSQL on Hadoop
SQL on Hadoop
 
Building a Hadoop Data Warehouse with Impala
Building a Hadoop Data Warehouse with ImpalaBuilding a Hadoop Data Warehouse with Impala
Building a Hadoop Data Warehouse with Impala
 
Closing The Loop for Evaluating Big Data Analysis
Closing The Loop for Evaluating Big Data AnalysisClosing The Loop for Evaluating Big Data Analysis
Closing The Loop for Evaluating Big Data Analysis
 
Big Data and Data Science for traditional Swiss companies
Big Data and Data Science for traditional Swiss companiesBig Data and Data Science for traditional Swiss companies
Big Data and Data Science for traditional Swiss companies
 
Design Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time LearningDesign Patterns for Large-Scale Real-Time Learning
Design Patterns for Large-Scale Real-Time Learning
 
Educating Data Scientists of the Future
Educating Data Scientists of the FutureEducating Data Scientists of the Future
Educating Data Scientists of the Future
 
Unleash the power of Big Data in your existing Data Warehouse
Unleash the power of Big Data in your existing Data WarehouseUnleash the power of Big Data in your existing Data Warehouse
Unleash the power of Big Data in your existing Data Warehouse
 
Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?Big data for Telco: opportunity or threat?
Big data for Telco: opportunity or threat?
 
Project "Babelfish" - A data warehouse to attack complexity
 Project "Babelfish" - A data warehouse to attack complexity Project "Babelfish" - A data warehouse to attack complexity
Project "Babelfish" - A data warehouse to attack complexity
 
Brainserve Datacenter: the High-Density Choice
Brainserve Datacenter: the High-Density ChoiceBrainserve Datacenter: the High-Density Choice
Brainserve Datacenter: the High-Density Choice
 
Urturn on AWS: scaling infra, cost and time to maket
Urturn on AWS: scaling infra, cost and time to maketUrturn on AWS: scaling infra, cost and time to maket
Urturn on AWS: scaling infra, cost and time to maket
 
The World Wide Distributed Computing Architecture of the LHC Datagrid
The World Wide Distributed Computing Architecture of the LHC DatagridThe World Wide Distributed Computing Architecture of the LHC Datagrid
The World Wide Distributed Computing Architecture of the LHC Datagrid
 
New opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph databaseNew opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph database
 
Technology Outlook - The new Era of computing
Technology Outlook - The new Era of computingTechnology Outlook - The new Era of computing
Technology Outlook - The new Era of computing
 
In-Store Analysis with Hadoop
In-Store Analysis with HadoopIn-Store Analysis with Hadoop
In-Store Analysis with Hadoop
 
Big Data Visualization With ParaView
Big Data Visualization With ParaViewBig Data Visualization With ParaView
Big Data Visualization With ParaView
 
Introduction to Apache Drill
Introduction to Apache DrillIntroduction to Apache Drill
Introduction to Apache Drill
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Big Data for CyberSecurity

  • 1. © 2013 IBM CorporationMay 14, 2013 Big Data for CyberSecurity Anand Ranganathan Research Staff Member, TJ Watson Research Center <arangana@us.ibm.com>
  • 2. Agenda  Cyber Threats  IBM Big Data Suite  Big Data Analytics for CyberSecurity – Monitor Network Behaviors to detect known and unknown cyber-threats in Enterprises – Detect Denial of Service Attacks in large ISPs – Detect Data-Leakage from organizations 2IB
  • 3. Cyber-Threats Are Becoming More Sophisticated 3
  • 4. 2011: Year of the Targeted Attack Source: IBM X-Force® Research 2011 Trend and Risk Report JK2012-04-26 Marketing Services Online Gaming Online Gaming Online Gaming Online Gaming Central Government Gaming Gaming Internet Services Online Gaming Online Gaming Online Services Online Gaming IT Security Banking IT Security Government Consulting IT Security Tele- communic ations Enter- tainment Consumer Electronics Agriculture Apparel Insurance Consulting Consumer Electronics Internet Services Central Govt Central Govt Central Govt Attack Type SQL Injection URL Tampering Spear Phishing 3rd Party Software DDoS SecureID Trojan Software Unknown Size of circle estimates relative impact of breach in terms of cost to business Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Entertainment Defense Defense Defense Consumer Electronics Central Government Central Government Central Government Central Government Central Government Central Government Central Government Consumer Electronics National Police National Police State Police State Police Police Gaming Financial Market Online Services Consulting Defense Heavy Industry Entertainment Banking 2011 Sampling of Security Incidents by Attack Type, Time and Impact conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
  • 5. 2012: The explosion of breaches continues! Source: IBM X-Force® Research 2012 Trend and Risk Report 2012 Sampling of Security Incidents by Attack Type, Time and Impact Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
  • 6. A Denial of Service attack that prevents or impairs the use of networks, systems, or applications by exhausting resources Malware infection - A virus, worm, Trojan horse, or other code-based malicious entity that successfully infects a host A targeted, advanced attack – also known as an advanced persistent threat (APT) - which is designed to be undetectable. Loss or theft of technology (laptops, memory sticks, PDAs) which contain sensitive data; Inadvertent disclosure of data Defacement - A person gains logical or physical access without permission and defaces a Web application Common Cyber Security Risks and Potential Impacts Loss of Customers Impact to Brand Sensitive Data Disclosure Stolen Intellectual Property Loss of Data & Productivity Personal and National Security Common Security Risks Potential Impacts Loss of Data or Productivity
  • 7. Botnets  Botnet = A network of compromised computers controlled by the botmaster, ranging in size from hundreds to millions of hosts  Purpose: denial of service attacks, spam delivery, stealing credentials and data, compromising control systems, etc.  Hosts infected by downloads from malicious websites, emailed executables, web, memory stick, PDF, …  Bots receive updates and commands from the Command and Control node and communications are becoming more sophisticated 7
  • 8. Botnet Communication There is need to talk:  Bots receive updates and commands from the C&C node  Utilize a command and control structure, through IRC, HTML, SSL, Twitter, IM or custom built solutions.  Botnet communications are becoming more sophisticated and harder to track – peer-to-peer, distributed vs. hierarchical control structure – fast fluxing, name generation 8 C&C P2P
  • 9. A Typical Threat Example 9 2 Malicious Web server sends or reflects exploit code <click> 1 Install Malware Mail-Client 5 Victim Domain Name Server Spammer Command & Control 4 web-page + 3 Follow link Execute (Spam..) 9 C&C / U pdater IP Address Lookup C &C / U pdater D N 6 Remotely Control Malware Contact Updater By IP Address (C&C)7 8
  • 10. A Typical Threat Example 10 2 Malicious Web server sends or reflects exploit code <click> 1 Install Malware Mail-Client 5 Victim Domain Name Server Spammer Command & Control 4 web-page + 3 Follow link Execute (Spam..) 9 C&C / U pdater IP Address Lookup C &C / U pdater D N 6 Remotely Control Malware Contact Updater By IP Address (C&C)7 8 d) Monitor Web Traffic a) Monitor DNS c) Monitor Port & Protocol Usage b) Monitor NetFlowb) Monitor NetFlow
  • 11. Typical Solution Architecture 11 01/11/10 DNS NetFlow ….. X86 Box X86 Blade Cell Blade X86 Blade FPGA Blade Operating System TransportSystem S Data Fabric Unsupervised Real-Time AnalyticsUnsupervised Real-Time Analytics Supervised LearningSupervised Learning Dashboarding / Visualization 1 3 2 Real-time Results (Tickets, Monitoring) Collect Results + Evidence Trends, History 4 Adapted Analytics Models • Cybersecurity Analytics • Real-Time processing of massive data streams • Advanced Data Mining, and Trend analytics • New and Incremental model learning PureData System for Analytics, BigInsights
  • 12. IBM Confidential © 2012 IBM Corporation12 Smarter Communications BI / Reporting BI / Reporting Exploration / Visualization Functional App Industry App Predictive Analytics Content Analytics Analytic Applications IBM Big Data Platform Systems Management Application Development Visualization & Discovery Accelerators Information Integration & Governance Hadoop System Stream Computing Data Warehouse IBM Big Data Suite
  • 13. IBM Confidential © 2012 IBM Corporation13 IBM InfoSphere Streams Millions of events per second Microse cond Latency Traditional / Non- traditional data sources Real time delivery Powerful Analytics Algo Trading Telco churn predict Smart Grid Cyber Security Government / Law enforcement ICU Monitoring Environment Monitoring A Platform for Real Time Analytics on BIG Data Volume Terabytes per second Petabytes per day Variety All kinds of data All kinds of analytics Velocity Insights in microseconds Agility Dynamically responsive Rapid application development
  • 14. IBM Confidential © 2012 IBM Corporation14  continuous ingestion  continuous analysis How Streams Works achieve scale by partitioning applications into components
  • 15. IBM Confidential © 2012 IBM Corporation15  continuous ingestion  continuous analysis achieve scale by partitioning applications into components by distributing across stream-connected hardware nodes How Streams Works infrastructure provides services for scheduling analytics across h/w nodes establishing streaming connectivity … TransformTransform FilterFilter ClassifyClassify CorrelateCorrelate AnnotateAnnotate where appropriate, elements can be “fused” together for lower communication latencies
  • 16. Security Appliances (Firewalls, IDS, IPS, SIEMs) vs Big Data IBM Big Data PlatformIBM QRadar Security Intelligence Platform Security use cases Turnkey Custom User Interface All-in-one console Purpose-built applications Data Sources 450+ preconfigured (and growing) Everything else Data Volume 100+ Terabyte range Peta-byte range Real-time Analysis Seconds Milliseconds Analytics Pre-built, primarily rule-based Custom, learning Required Expertise Average - Security practitioners Skilled – Data scientists and analysts InfoSphere BigInsights, Streams and PureData for Analytics
  • 17. Organizations have a growing need to identify and protect against threats by building insights from broader and larger data sets
  • 18. A Typical Threat Example 20 2 Malicious Web server sends or reflects exploit code <click> 1 Install Malware Mail-Client 5 Victim Domain Name Server Spammer Command & Control 4 web-page + 3 Follow link Execute (Spam..) 9 C&C / U pdater IP Address Lookup C &C / U pdater D N 6 Remotely Control Malware Contact Updater By IP Address (C&C)7 8 d) Monitor Web Traffic a) Monitor DNS c) Monitor Port & Protocol Usage b) Monitor NetFlowb) Monitor NetFlow
  • 19. Traditional Security Analytics 21 Monitored Network Monitored Network The Rest Of The World DNSDNSDNS DHCPDHCP Firewall IDS/ IPS Inline Conventional Setup Detect Signatures within Individual Data Streams
  • 20. Streaming Analytics 22 Monitored Network Monitored Network The Rest Of The World (Internet) DNSDNSDNS DHCPDHCP Firewall IDS/ IPS Inline Real-Time Streaming Analytics Setup Detect Signatures within Individual Data Streams Real-Time Cyber Security Analytics Detects behaviors by correlating across diverse & massive data streams via Analytics in Motion Models learnt offline with Analytics on Data at Rest IDS/IPS Alerts…
  • 21. Streaming Analytics for Fast-flux Botnets 23 DNS Response Records Suspected Fast-flux Domain Names JoinJoin DNS Queries (with internal querying host IP Addresses) FastFlux Analytics FastFlux Analytics FastFlux Analytics FastFlux Analytics FastFlux Analytics FastFlux Analytics Candidate Names/IP's with Confidence Values AggregatorAggregator Suspected Fast-Flux IP-addresses JoinJoin DHCP Traffic (IP  MAC  System/Owner) Fast-fluxing Bot alerts JoinJoin Host LogsHost Logs IPS AlertsIPS Alerts … Netflow
  • 22. 24
  • 23. Use Case 2 - Detect Distributed Denial of Service Attacks in ISPs  DDOS attacks often launched by botnets to flood a target server  Often use techniques to amplify the flooding – E.g. DNS Amplification Attacks  Very hard to detect and prevent in time – Need to monitor 100s of Gbps – Need to monitor millions of DNS requests per second  Use InfoSphere Streams for running analytics for detecting DDOS attacks – Look for anomalies in DNS server requests – Scale to internet level traffic rates © 2013 IBM Corporation25
  • 24. Use Case 3 - Detect Data-Leakage from organizations  Determine what information employees (or bots) are sending out of the company – Look at the all information flowing out of the company to the outside world – Determine if it contains any confidential or sensitive information  Monitor what information employees (or bots) are seeing/accessing – Determine if they are accessing sensitive information (even if they may have the rights to access it) – Determine if their access patterns are suddenly changing • E.g. an employee that is suddenly accessing much more information than he (or someone else in his role) typically accesses may want to sell this information outside or leave the company © 2013 IBM Corporation26
  • 25. 27
  • 26. DNS Amplification Attack Key characteristics: 1) Targeted attack victimizing hosts & servers 2) DNS service provider becomes a participant and unavailable during attack 3) Attack attribution is hard 28 To delete

Notas del editor

  1. This slide shows you sort of a timeline of events during the first half of 2011. A bunch of different attacks against major organizations, many of whom we feel are probably pretty operationally competent. These are not surprising that some of these organizations were breached. Also, we sort of relate the attack vector as best we understand it based on what ’s been publicly disclosed. And we also - we sort of have a conjecture about the impact of the breach from a financial standpoint, and that’s a rough estimate based on what’s been publicly disclosed. So those numbers are certainly not to be bet on or anything. But it’s as good as we can do based on what we know.
  2. Open Security Foundation reported 40% increase in breach events for 2012 that cover loss, theft, and exposure of personally identifiable information
  3. There is need to talk: Bots receive updates and commands from the C&amp;C node Utilize a command and control structure, through IRC, HTML, SSL, Twitter, IM or custom built solutions. Botnet communications are becoming more sophisticated and harder to track peer-to-peer, distributed vs. hierarchical control structure fast fluxing, name generation
  4. Key Points - Integrate v3 – the point is to have one platform to manage all of the data – there’s no point in having separate silos of data, each creating separate silos of insight. From the customer POV (a solution POV) big data has to be bigger than just one technology Analyze v3 – very important point – we see big data as a viable place to analyze and store data. New technology is not just a pre-processor to get data into a structured DW for analysis. Significant area of value add by IBM – and the game has changed – unlike DBs/SQL, the market is asking who gets the better answer and therefore sophistication and accuracy of the analytics matters Visualization – need to bring big data to the users – spreadsheet metaphor is the key to doing son Development – need sophisticated development tools for the engines and across them to enable the market to develop analytic applications Workload optimization – improvements upon open source for efficient processing and storage Security and Governance – many are rushing into big data like the wild west. But there is sensitive data that needs to be protected, retention policies need to be determined – all of the maturity of governance for the structured world can benefit the big data world
  5. IBM IOD 2011 05/14/13 Prensenter name here.ppt
  6. What we are monitoring: &gt; 12.000 Systems, we have about 12.000 unique MAC addresses in our db and we can only get to MAC addresses for a part of the systems we monitor (mostly systems using DHCP) since we do not yet connect to infrastructure that assign fixed IP addresses. We added ARP monitoring to correlate static IP addresses with their MAC addresses but see only partially the ARP traffic since the taps are located at the network boundaries. We track about 200.000-600.000 unique domain names per day, 20K to 120K unique domain names per hour, just to give you an idea.