SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Insider Threat!!!
What US Department of
Defense want?
Lan Nguyen
Co-founder
Veramine Inc.
Outline
 About Insider Threat
 Definition and Research
 Motivations and Statistics,
 US military cases: Snowden and others
 US Government and DOD Measures
 Solutions to Insider Threat:
 Public Information and Veramine projects with US DOD, DHS and Airforce
 Strongly supported by Solutions for External Threats, i.e. EDR and Deception
 UAM, UEBA: Detections by AI, Rules, and Controls over Data, User and Device
 Forensics and Logs: Collecting Artifacts, Variety, Details, Realtime, Filtered
 Incident Response Actions on Hosts, Users… Threat Hunting with Yara and Search
Veramine Inc.
Advanced Endpoint Security
About Insider Threat
Definition of Insider Threat (Wikipedia)
- malicious to an organization
- comes from people within the organization
- have inside information of the organization’s IT systems
- involve fraud or theft of confidential or commercially valuable information
- or theft of intellectual property, or sabotage of computer systems
Research: CERT Insider Threat Center of Carnegie-Mellon University
- database of 850+ insider threat cases, including fraud, theft and sabotage
- blog to help organizations defend themselves against insider crime
- Insider Threat Test Datasets for Data Analysis and Machine Learning
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508099
Veramine Inc.
Advanced Endpoint Security
About Insider Threat
Veramine Inc.
Advanced Endpoint Security
Motivations
Veramine Inc.
Advanced Endpoint Security
2500INTERNAL SECURITY BREACHES OCCURRING IN US BUSINESS EVERY DAY
https://www.isdecisions.com/insider-threat/statistics.htm
Motivations
Veramine Inc.
Advanced Endpoint Security
According to insider threat statistics from a Ponemon
Institute study, accidental insider threat cost roughly $283,000
per incident, but due to their frequency, these incidents racked
up to $3.8 million per year, per organization
Motivations
Veramine Inc.
Advanced Endpoint Security
The figures come from Verizon's Insider Threat
Report, a report released this week that reframes
data from the company's 2018 Data Breach
Investigations Report (DBIR)
Edward Snowden Case
- was a Central Intelligence Agency (CIA) employee and subcontractor
- given full administrator privileges with virtually unlimited access to NSA data
- copied and leaked thousands of highly classified information from the National
Security Agency (NSA) in June 2013
- the disclosures revealed numerous global surveillance programs, run by NSA,
European governments, Five Eyes Intelligence Alliance, telecom companies
Snowden is very technical
- six months training full-time at CIA's secret school for technology specialists
- former NSA co-worker said Snowden was a "genius among geniuses" who
created a widely implemented backup system for the NSA and often pointed
out security flaws to the agency
- offered a position on NSA's elite team of hackers, Tailored Access Operations
Veramine Inc.
Advanced Endpoint Security
Other US military cases
Chelsea Manning
- former US Army soldier, assigned in 2009 to an Army unit in Iraq as an
intelligence analyst
- disclosed to WikiLeaks nearly 750,000 classified, or unclassified but sensitive,
military and diplomatic documents, in early 2010
Harold T. Martin III
- accused of stealing approximately 50 terabytes of data
- from the Central Intelligence Agency, the National Security Agency, the
United States Cyber Command, the United States Department of Defense
and the National Reconnaissance Office
- US gov agencies failed to effectively detect and respond to Martin's
practices and behaviors over 10 to 20 years, until 2016
Veramine Inc.
Advanced Endpoint Security
US Gov Reactions to Insider Threat
October 2011, US President Obama issued Executive Order 13587
establishing the National Insider Threat Task Force (NITTF)
2017 NITTF Insider Threat Guide and NITTF Tech Bulletin 20180527: How
Committee on National Security Systems Directive 504 (CNSSD 504 - technical
cores of insider threat prevention) Defines User Activity Monitoring (UAM)
November 1, 2018, NITTF released the Insider Threat Program Maturity
Framework, an aid for advancing federal agencies’ programs beyond the
Minimum Standards, and builds upon 2017 NITTF Insider Threat Guide
Veramine Inc.
Advanced Endpoint Security
Committee on National Security Systems
Directive 504 (CNSSD 504) - 2016
Technical functionality that a user activity monitoring (UAM) solution must have to meet the Directive’s
requirements
UAM “technical capability to observe and record the actions and activities of an individual, at any time, on
any device accessing U.S. Government information in order to detect insider threats and to support
authorized investigations.“
- a structured, consistent, and continuous collection and reporting process
- across the whole of an organization at the device level
- for identifying, assessing, deciding upon responses to, and acting
- upon specific analysis of insider threat behaviors
Every department and agency (D/A) should have five minimum technical capabilities to collect user activity
data
- keystroke monitoring,
- full application content (e.g., email, chat, data import, data export),
- screen capture,
- file shadowing for all lawful purposes (i.e., the ability to track documents when the names and locations
have changed)
- collected UAM data must be attributable to a specific user. The D/A should incorporate UAM data into
an analysis system that is capable of identifying anomalous behavior.
Veramine Inc.
Advanced Endpoint Security
Cybersecurity Maturity Model
Certification (CMMC)
July 16, 2019 DoD Announces the Cybersecurity Maturity Model Certification
(CMMC) Initiative
- a framework aimed at assessing and enhancing the cybersecurity posture of
the Defense Industrial Base (“DIB”), particularly controlled unclassified
information (“CUI”)
- in response to a series of high profile breaches of DoD information.
- all companies conducting business with the DoD, including subcontractors,
must be certified.
Veramine Inc.
Advanced Endpoint Security
User and Entity Behavior Analytics
(UEBA)
 Examples of machine-learning detection algorithms:
 User tracking: deviances from norms of user logon & logoff behaviorSMB tracking:
deviances from normal SMB behaviors indicating lateral movement
 Printing tracking: deviances from normal printing behaviors of each user
 Process profiling: deviances from norms of process behavior
 “Data Exfiltration” detection
 Insiders can gather important data (database of classified, ssn, financials,
secrets...), compress and encrypt it, and then exfil it to external sites
 deviances from historical and seasonal norms of network volume
 Several other detections about anomalies in certs, networks, eop registries,
process tampering, user activities…
 Deep Learning, Bayesian network, Naïve Bayes, Regression…
Veramine Inc.
Advanced Endpoint Security
DNN: Forward and backward functions
From Coursera
CNN: AlexNet
= ⋮ ⋮
227×227 ×3
55×55 × 96 27×27 ×96 27×27 ×256 13×13 ×256
13×13 ×384 13×13 ×384 13×13 ×256 6×6 ×256 9216 4096
⋮
4096
11 × 11
s = 4
3 × 3
s = 2
MAX-POOL
5 × 5
same
3 × 3
s = 2
MAX-POOL
3 × 3
same
3 × 3 3 × 3 3 × 3
s = 2
MAX-POOL
Softmax
1000
[Krizhevsky et al., 2012. ImageNet classification with deep convolutional neural networks] From Coursera
Summary of RNN types
One to one One to many Many to one
Many to many Many to many
From Coursera
User Activities Monitoring (UAM)
User Control
 Keylogging, Screenshot
captures, Activities on
Browsing, Email, SMB
 Data on User, Sessions,
Console, RDP…
 Use case example: Monitoring
activities on most important
servers, such as AD, DB, SMB,
Data Center servers, and
designated computers
accessing those servers.
 Video Capability: near-real
time “video” capability to view
user activities at endpoints
Veramine Inc.
Advanced Endpoint Security
User Activities Monitoring (UAM)
Device Control
 Devices Policy defines
a list of USBs based on
their Vendor Id,
Product Id, Serial.
When such a device is
plugged-in, sensor can
block / allow access to
this USB device based
on policy settings.
 History of USB activities
such as Inserts,
Removals
Veramine Inc.
Advanced Endpoint Security
Specific device,
vendor, or product ID
can be given:
 No Access (blocked)
 Read-Only Access
 Read-Write Access
All by policy
Veramine Inc.
Advanced Endpoint Security
User Activities Monitoring (UAM)
Device Control
 Based on Velociraptor,
collecting artifacts from
endpoints
 Includes ~60 Windows
artifacts
 Instantly send an action
to one host or many.
 Actions send
immediately to
connected hosts, queue
for disconnected hosts
Veramine Inc.
Advanced Endpoint Security
Forensics
 Can define built-in collection tasks or define new ones
 VQL: SELECT [Columns] FROM [plugins(args)] WHERE [Conditions]
Veramine Inc.
Advanced Endpoint Security
Forensics
 VQL, simply improved
from SQL, allows artifact
collection tasks to be
quickly programmed,
automated and shared.
Turn-around from IOC to
full hunt: a few minutes.
 E.g. VQL to collect files
(artifacts) in users’ temp
directory which have
been created within the
last week, or changed in
the last hour. Its
parameters:
 Target group of hosts
 Directory to search
 Required age of files
Veramine Inc.
Advanced Endpoint Security
Forensics
 Forensics tab has
searching, sorting, filtering
 Cancel Queued Collection
jobs, Delete Results from
already run jobs
Veramine Inc.
Advanced Endpoint Security
Forensics
 New Forensics tab under “Response”
 List of jobs + state (queued, in progress, completed, error)
Veramine Inc.
Advanced Endpoint Security
Forensics
 We show Velociraptor JSON, sortable, searchable
 Results ZIP has TXT, CSV, JSON, collected files
Veramine Inc.
Advanced Endpoint Security
Forensics
Combined with Solutions for External
Threats
3 endpoint solutions that can also be packaged into 3-in-1:
- Endpoint Detection and Response (EDR), a main anti-APT tool set, to
effectively provide Detection, Investigation, Response, Data Collection...
- Dynamic Deception System (DDS), a Platform of Traps, such as Deceptive
services, processes, mutexes, credentials, network listeners, data shares,
registry helper, virtual boxes, VMs..., as Active Defense to Detect and Prevent
attacks
- Insider Threat Prevention (ITP), combining Advanced Controls of Users, Data
and Devices, such as Key loggers, Screenshots, Browsing, Email activities, USB
Tracking and Permissions, Digital Forensics...
Veramine Inc.
Advanced Endpoint Security
 Detection and Tracking of insider threats through SMB network share access;
 SMB file share tracking; where people copy files from a network share to their local drive
 captures files, exfiltration
 Look for compromised accounts, using mimikatz to obtain credentials
EDR Detection for Insider Threat
Veramine Inc.
Advanced Endpoint Security
IR Investigation: Yara Memory Search
 Sensor reports processes matching yara expression (per process, not
only system match)
Veramine Inc.
Advanced Endpoint Security
 Customers can Save + Update commonly-used Yara expressions
 Schedule periodic Yara memory search
Veramine Inc.
Advanced Endpoint Security
Yara Memory Search Easy UX
Yara Memory Search Easy UX
Veramine Inc.
Advanced Endpoint Security
IR Response Actions
Host Control: Network
Quarantine, Shutdown, Reboot
Veramine Inc.
Advanced Endpoint Security
User and Session Control:
Disconnect, Disable, Enable
Deception Shares and Files
Veramine Inc.
Advanced Endpoint Security
Deception Shares and Files
Veramine Inc.
Advanced Endpoint Security
Deception Process, Service
Veramine Inc.
Advanced Endpoint Security
Deception Credentials
Veramine Inc.
Advanced Endpoint Security
Performance
 On average taking less than 1% CPU and 20 MB RAM.
 On average, per host, network traffic is less than 30 MB / 1 day.
 Network traffic can be further tuned using collection policies which allows
to configure which events are collected by sensors.
Veramine Inc.
Advanced Endpoint Security
Q&A
Thanks!!
Contact: Nguyễn Duy Lân
Email: lan at veramine.com
Veramine Inc.
Advanced Endpoint Security

Más contenido relacionado

La actualidad más candente

VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecuritySatnam Singh
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspectiveDr. Anish Cheriyan (PhD)
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Digit Oktavianto
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9UISGCON
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 

La actualidad más candente (19)

VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
AI for CyberSecurity
AI for CyberSecurityAI for CyberSecurity
AI for CyberSecurity
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Data security
Data securityData security
Data security
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
 
Insider Threat
Insider ThreatInsider Threat
Insider Threat
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 

Similar a Insider threat-what-us-do d-want

LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunk
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunk
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security RisksDavid Kondrup
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 

Similar a Insider threat-what-us-do d-want (20)

LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Is4560
Is4560Is4560
Is4560
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 

Más de Security Bootcamp

Ransomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewSecurity Bootcamp
 
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSecurity Bootcamp
 
Giam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrGiam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrSecurity Bootcamp
 
Macro malware common techniques - public
Macro malware   common techniques - publicMacro malware   common techniques - public
Macro malware common techniques - publicSecurity Bootcamp
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Tim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuTim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuSecurity Bootcamp
 
Threat detection with 0 cost
Threat detection with 0 costThreat detection with 0 cost
Threat detection with 0 costSecurity Bootcamp
 
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active DirectorySecurity Bootcamp
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018Security Bootcamp
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Security Bootcamp
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaSecurity Bootcamp
 
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]Tran Minh Tri - Bao mat du lieu thoi ky [3.0]
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]Security Bootcamp
 

Más de Security Bootcamp (20)

Ransomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
 
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
 
Deception change-the-game
Deception change-the-gameDeception change-the-game
Deception change-the-game
 
Giam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrGiam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdr
 
Sbc2019 luong-cyber startup
Sbc2019 luong-cyber startupSbc2019 luong-cyber startup
Sbc2019 luong-cyber startup
 
Macro malware common techniques - public
Macro malware   common techniques - publicMacro malware   common techniques - public
Macro malware common techniques - public
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Tim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuTim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cu
 
Threat detection with 0 cost
Threat detection with 0 costThreat detection with 0 cost
Threat detection with 0 cost
 
Build SOC
Build SOC Build SOC
Build SOC
 
AD red vs blue
AD red vs blueAD red vs blue
AD red vs blue
 
Securitybox
SecurityboxSecuritybox
Securitybox
 
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ Vikjava
 
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]Tran Minh Tri - Bao mat du lieu thoi ky [3.0]
Tran Minh Tri - Bao mat du lieu thoi ky [3.0]
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Insider threat-what-us-do d-want

  • 1. Insider Threat!!! What US Department of Defense want? Lan Nguyen Co-founder Veramine Inc.
  • 2. Outline  About Insider Threat  Definition and Research  Motivations and Statistics,  US military cases: Snowden and others  US Government and DOD Measures  Solutions to Insider Threat:  Public Information and Veramine projects with US DOD, DHS and Airforce  Strongly supported by Solutions for External Threats, i.e. EDR and Deception  UAM, UEBA: Detections by AI, Rules, and Controls over Data, User and Device  Forensics and Logs: Collecting Artifacts, Variety, Details, Realtime, Filtered  Incident Response Actions on Hosts, Users… Threat Hunting with Yara and Search Veramine Inc. Advanced Endpoint Security
  • 3. About Insider Threat Definition of Insider Threat (Wikipedia) - malicious to an organization - comes from people within the organization - have inside information of the organization’s IT systems - involve fraud or theft of confidential or commercially valuable information - or theft of intellectual property, or sabotage of computer systems Research: CERT Insider Threat Center of Carnegie-Mellon University - database of 850+ insider threat cases, including fraud, theft and sabotage - blog to help organizations defend themselves against insider crime - Insider Threat Test Datasets for Data Analysis and Machine Learning https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508099 Veramine Inc. Advanced Endpoint Security
  • 4. About Insider Threat Veramine Inc. Advanced Endpoint Security
  • 5. Motivations Veramine Inc. Advanced Endpoint Security 2500INTERNAL SECURITY BREACHES OCCURRING IN US BUSINESS EVERY DAY https://www.isdecisions.com/insider-threat/statistics.htm
  • 6. Motivations Veramine Inc. Advanced Endpoint Security According to insider threat statistics from a Ponemon Institute study, accidental insider threat cost roughly $283,000 per incident, but due to their frequency, these incidents racked up to $3.8 million per year, per organization
  • 7. Motivations Veramine Inc. Advanced Endpoint Security The figures come from Verizon's Insider Threat Report, a report released this week that reframes data from the company's 2018 Data Breach Investigations Report (DBIR)
  • 8. Edward Snowden Case - was a Central Intelligence Agency (CIA) employee and subcontractor - given full administrator privileges with virtually unlimited access to NSA data - copied and leaked thousands of highly classified information from the National Security Agency (NSA) in June 2013 - the disclosures revealed numerous global surveillance programs, run by NSA, European governments, Five Eyes Intelligence Alliance, telecom companies Snowden is very technical - six months training full-time at CIA's secret school for technology specialists - former NSA co-worker said Snowden was a "genius among geniuses" who created a widely implemented backup system for the NSA and often pointed out security flaws to the agency - offered a position on NSA's elite team of hackers, Tailored Access Operations Veramine Inc. Advanced Endpoint Security
  • 9. Other US military cases Chelsea Manning - former US Army soldier, assigned in 2009 to an Army unit in Iraq as an intelligence analyst - disclosed to WikiLeaks nearly 750,000 classified, or unclassified but sensitive, military and diplomatic documents, in early 2010 Harold T. Martin III - accused of stealing approximately 50 terabytes of data - from the Central Intelligence Agency, the National Security Agency, the United States Cyber Command, the United States Department of Defense and the National Reconnaissance Office - US gov agencies failed to effectively detect and respond to Martin's practices and behaviors over 10 to 20 years, until 2016 Veramine Inc. Advanced Endpoint Security
  • 10. US Gov Reactions to Insider Threat October 2011, US President Obama issued Executive Order 13587 establishing the National Insider Threat Task Force (NITTF) 2017 NITTF Insider Threat Guide and NITTF Tech Bulletin 20180527: How Committee on National Security Systems Directive 504 (CNSSD 504 - technical cores of insider threat prevention) Defines User Activity Monitoring (UAM) November 1, 2018, NITTF released the Insider Threat Program Maturity Framework, an aid for advancing federal agencies’ programs beyond the Minimum Standards, and builds upon 2017 NITTF Insider Threat Guide Veramine Inc. Advanced Endpoint Security
  • 11. Committee on National Security Systems Directive 504 (CNSSD 504) - 2016 Technical functionality that a user activity monitoring (UAM) solution must have to meet the Directive’s requirements UAM “technical capability to observe and record the actions and activities of an individual, at any time, on any device accessing U.S. Government information in order to detect insider threats and to support authorized investigations.“ - a structured, consistent, and continuous collection and reporting process - across the whole of an organization at the device level - for identifying, assessing, deciding upon responses to, and acting - upon specific analysis of insider threat behaviors Every department and agency (D/A) should have five minimum technical capabilities to collect user activity data - keystroke monitoring, - full application content (e.g., email, chat, data import, data export), - screen capture, - file shadowing for all lawful purposes (i.e., the ability to track documents when the names and locations have changed) - collected UAM data must be attributable to a specific user. The D/A should incorporate UAM data into an analysis system that is capable of identifying anomalous behavior. Veramine Inc. Advanced Endpoint Security
  • 12. Cybersecurity Maturity Model Certification (CMMC) July 16, 2019 DoD Announces the Cybersecurity Maturity Model Certification (CMMC) Initiative - a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (“DIB”), particularly controlled unclassified information (“CUI”) - in response to a series of high profile breaches of DoD information. - all companies conducting business with the DoD, including subcontractors, must be certified. Veramine Inc. Advanced Endpoint Security
  • 13. User and Entity Behavior Analytics (UEBA)  Examples of machine-learning detection algorithms:  User tracking: deviances from norms of user logon & logoff behaviorSMB tracking: deviances from normal SMB behaviors indicating lateral movement  Printing tracking: deviances from normal printing behaviors of each user  Process profiling: deviances from norms of process behavior  “Data Exfiltration” detection  Insiders can gather important data (database of classified, ssn, financials, secrets...), compress and encrypt it, and then exfil it to external sites  deviances from historical and seasonal norms of network volume  Several other detections about anomalies in certs, networks, eop registries, process tampering, user activities…  Deep Learning, Bayesian network, Naïve Bayes, Regression… Veramine Inc. Advanced Endpoint Security
  • 14. DNN: Forward and backward functions From Coursera
  • 15. CNN: AlexNet = ⋮ ⋮ 227×227 ×3 55×55 × 96 27×27 ×96 27×27 ×256 13×13 ×256 13×13 ×384 13×13 ×384 13×13 ×256 6×6 ×256 9216 4096 ⋮ 4096 11 × 11 s = 4 3 × 3 s = 2 MAX-POOL 5 × 5 same 3 × 3 s = 2 MAX-POOL 3 × 3 same 3 × 3 3 × 3 3 × 3 s = 2 MAX-POOL Softmax 1000 [Krizhevsky et al., 2012. ImageNet classification with deep convolutional neural networks] From Coursera
  • 16. Summary of RNN types One to one One to many Many to one Many to many Many to many From Coursera
  • 17. User Activities Monitoring (UAM) User Control  Keylogging, Screenshot captures, Activities on Browsing, Email, SMB  Data on User, Sessions, Console, RDP…  Use case example: Monitoring activities on most important servers, such as AD, DB, SMB, Data Center servers, and designated computers accessing those servers.  Video Capability: near-real time “video” capability to view user activities at endpoints Veramine Inc. Advanced Endpoint Security
  • 18. User Activities Monitoring (UAM) Device Control  Devices Policy defines a list of USBs based on their Vendor Id, Product Id, Serial. When such a device is plugged-in, sensor can block / allow access to this USB device based on policy settings.  History of USB activities such as Inserts, Removals Veramine Inc. Advanced Endpoint Security
  • 19. Specific device, vendor, or product ID can be given:  No Access (blocked)  Read-Only Access  Read-Write Access All by policy Veramine Inc. Advanced Endpoint Security User Activities Monitoring (UAM) Device Control
  • 20.  Based on Velociraptor, collecting artifacts from endpoints  Includes ~60 Windows artifacts  Instantly send an action to one host or many.  Actions send immediately to connected hosts, queue for disconnected hosts Veramine Inc. Advanced Endpoint Security Forensics
  • 21.  Can define built-in collection tasks or define new ones  VQL: SELECT [Columns] FROM [plugins(args)] WHERE [Conditions] Veramine Inc. Advanced Endpoint Security Forensics
  • 22.  VQL, simply improved from SQL, allows artifact collection tasks to be quickly programmed, automated and shared. Turn-around from IOC to full hunt: a few minutes.  E.g. VQL to collect files (artifacts) in users’ temp directory which have been created within the last week, or changed in the last hour. Its parameters:  Target group of hosts  Directory to search  Required age of files Veramine Inc. Advanced Endpoint Security Forensics
  • 23.  Forensics tab has searching, sorting, filtering  Cancel Queued Collection jobs, Delete Results from already run jobs Veramine Inc. Advanced Endpoint Security Forensics
  • 24.  New Forensics tab under “Response”  List of jobs + state (queued, in progress, completed, error) Veramine Inc. Advanced Endpoint Security Forensics
  • 25.  We show Velociraptor JSON, sortable, searchable  Results ZIP has TXT, CSV, JSON, collected files Veramine Inc. Advanced Endpoint Security Forensics
  • 26. Combined with Solutions for External Threats 3 endpoint solutions that can also be packaged into 3-in-1: - Endpoint Detection and Response (EDR), a main anti-APT tool set, to effectively provide Detection, Investigation, Response, Data Collection... - Dynamic Deception System (DDS), a Platform of Traps, such as Deceptive services, processes, mutexes, credentials, network listeners, data shares, registry helper, virtual boxes, VMs..., as Active Defense to Detect and Prevent attacks - Insider Threat Prevention (ITP), combining Advanced Controls of Users, Data and Devices, such as Key loggers, Screenshots, Browsing, Email activities, USB Tracking and Permissions, Digital Forensics... Veramine Inc. Advanced Endpoint Security
  • 27.  Detection and Tracking of insider threats through SMB network share access;  SMB file share tracking; where people copy files from a network share to their local drive  captures files, exfiltration  Look for compromised accounts, using mimikatz to obtain credentials EDR Detection for Insider Threat Veramine Inc. Advanced Endpoint Security
  • 28. IR Investigation: Yara Memory Search  Sensor reports processes matching yara expression (per process, not only system match) Veramine Inc. Advanced Endpoint Security
  • 29.  Customers can Save + Update commonly-used Yara expressions  Schedule periodic Yara memory search Veramine Inc. Advanced Endpoint Security Yara Memory Search Easy UX
  • 30. Yara Memory Search Easy UX Veramine Inc. Advanced Endpoint Security
  • 31. IR Response Actions Host Control: Network Quarantine, Shutdown, Reboot Veramine Inc. Advanced Endpoint Security User and Session Control: Disconnect, Disable, Enable
  • 32. Deception Shares and Files Veramine Inc. Advanced Endpoint Security
  • 33. Deception Shares and Files Veramine Inc. Advanced Endpoint Security
  • 34. Deception Process, Service Veramine Inc. Advanced Endpoint Security
  • 36. Performance  On average taking less than 1% CPU and 20 MB RAM.  On average, per host, network traffic is less than 30 MB / 1 day.  Network traffic can be further tuned using collection policies which allows to configure which events are collected by sensors. Veramine Inc. Advanced Endpoint Security
  • 37. Q&A Thanks!! Contact: Nguyễn Duy Lân Email: lan at veramine.com Veramine Inc. Advanced Endpoint Security