28
Data Analytics for Security Intelligence Camil Demetrescu Dept. Computer, Control, and Management Engineering Credits: Peter Wood, First Base Technologies LLP Data Driven Innovation Rome 2016 – Open Summit Roma Tre University, May 20 2016

Data Analytics for Security Intelligence

Embed Size (px)

Citation preview

Page 1: Data Analytics for Security Intelligence

Data Analytics for Security Intelligence

Camil Demetrescu

Dept. Computer, Control, and Management Engineering Credits: Peter Wood, First Base Technologies LLP

Data Driven Innovation Rome 2016 – Open Summit Roma Tre University, May 20 2016

Page 2: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 2

Page 3: Data Analytics for Security Intelligence

Big data Every day, we create 2.5 quintillion bytes of data. 90% of the data in the world today has been created in the last two years alone.

http://www-01.ibm.c/software/data/bigdata/

2.5 quintillion = 2.5 exabytes = 2.5 x 1018 = 2.500.000.000.000.000.000 bytes

•  Sensors used to gather climate information •  Posts to social media sites •  Digital pictures and videos •  Purchase transaction records •  Cell phone GPS signals

20/5/2016 Data Driven Innovation Rome 2016 Page 3

Page 4: Data Analytics for Security Intelligence

20/5/2016 Data Driven Innovation Rome 2016 Page 4

Page 5: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 5

Page 6: Data Analytics for Security Intelligence

Malware events per hour

20/5/2016 Data Driven Innovation Rome 2016 Page 6

Organisations on average are experiencing malware-related activities once every three minutes. Receipt of a malicious email, a user clicking a link on an infected website, or an infected machine making a call back to a command and control server.

Fire

Eye

Adv

ance

d Th

reat

Rep

ort 2

012

Page 7: Data Analytics for Security Intelligence

How breach occurred

20/5/2016 Data Driven Innovation Rome 2016 Page 7

The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners

Page 8: Data Analytics for Security Intelligence

When the breach was discovered

20/5/2016 Data Driven Innovation Rome 2016 Page 8

The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners

Page 9: Data Analytics for Security Intelligence

Reasons for failing to prevent the breach

20/5/2016 Data Driven Innovation Rome 2016 Page 9

The

Pos

t Bre

ach

Boo

m, P

onem

on In

stitu

te 2

015

Sur

vey

of 3

,529

IT a

nd IT

sec

urity

pra

ctiti

oner

s

Page 10: Data Analytics for Security Intelligence

Extrapolated cost of breach

20/5/2016 Data Driven Innovation Rome 2016 Page 10

The

Pos

t Bre

ach

Boo

m, P

onem

on In

stitu

te 2

015

Sur

vey

of 3

,529

IT a

nd IT

sec

urity

pra

ctiti

oner

s

Page 11: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 11

Page 12: Data Analytics for Security Intelligence

Data driven information security: examples

20/5/2016 Data Driven Innovation Rome 2016 Page 12

•  Analyze system/applications log files •  Analyze network traffic •  Identify anomalies and suspicious activities

•  Correlate multiple sources of information into a coherent view

Page 13: Data Analytics for Security Intelligence

Why do we need big data systems?

20/5/2016 Data Driven Innovation Rome 2016 Page 13

•  System Log files that can grow by gigabytes per second

•  Network data captures, which can grow by 10s of gigabytes per second

•  Intrusion Detection/Protection log files that can grow by 10s of gigabytes per second

•  Application Log files that can grow by gigabytes per second

http://www.virtualizationpractice.com/big-data-security-tools-22075/

Page 14: Data Analytics for Security Intelligence

Traditional scenarios

Traditional defences: •  Signature-based anti-virus •  Signature-based IDS/IDP •  Firewalls and perimeter devices

Traditional approach: •  Data collection for compliance •  Check-list mindset •  Tactical thinking

20/5/2016 Data Driven Innovation Rome 2016 Page 14

Page 15: Data Analytics for Security Intelligence

New challenges

Complex threat landscape: •  Stealth malware •  Targeted attacks •  Social engineering

New technologies and challenges: •  Social networking •  Cloud •  BYOD / consumerisation •  Virtualisation

20/5/2016 Data Driven Innovation Rome 2016 Page 15

Page 16: Data Analytics for Security Intelligence

Conventional vs. advanced approaches

20/5/2016 Data Driven Innovation Rome 2016 Page 16

http

://w

ww

.em

c.co

m/c

olla

tera

l/ind

ustry

-ove

rvie

w/s

bic-

rpt.p

df

Page 17: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 17

Page 18: Data Analytics for Security Intelligence

Data-driven information security: early times

20/5/2016 Data Driven Innovation Rome 2016 Page 18

•  Bank fraud detection and anomaly-based intrusion detection systems.

•  Credit card companies have conducted fraud detection for decades.

•  Custom-built infrastructure to mine big data for fraud detection was not economical to adapt for other fraud detection uses (healthcare, insurance, etc.)

Cloud Security Alliance

Page 19: Data Analytics for Security Intelligence

Data analytics for intrusion detection

20/5/2016 Data Driven Innovation Rome 2016 Page 19

Intrusion detection systems – Security architects realized the need for layered security (e.g., reactive security and breach response) because a system with 100% protective security is impossible.

1st generation

2nd generation

Security information and event management (SIEM) – aggregate and filter alarms from many sources and present actionable information to security analysts.

3rd generation

Big data analytics in security (2nd generation SIEM) – correlating, consolidating, and contextualizing diverse security event information, correlating long-term historical data for forensic purposes

Page 20: Data Analytics for Security Intelligence

How can big data analytics help?

•  Advanced persistent threat (APT) detection? •  Integration of IT and physical security?

•  Predictive analysis

•  Real-time updates

•  Behaviour models

•  Correlation

•  … advising the analysts?

•  … active defence?

20/5/2016 Data Driven Innovation Rome 2016 Page 20

Page 21: Data Analytics for Security Intelligence

How can big data analytics help?

20/5/2016 Data Driven Innovation Rome 2016 Page 21

Page 22: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 22

Page 23: Data Analytics for Security Intelligence

Big data security challenges

•  Bigger data = bigger breaches?

•  New technology = security later?

•  Information classification

•  Information ownership (outputs and raw data)

•  Big data in cloud + BYOD = more problems?

20/5/2016 Data Driven Innovation Rome 2016 Page 23

Page 24: Data Analytics for Security Intelligence

Big data security risks

•  New technology will introduce new vulnerabilities

•  Attack surface of the nodes in a cluster may not have been reviewed and servers adequately hardened

•  User authentication and access to data from multiple locations may not be sufficiently controlled

•  Regulatory requirements may not be fulfilled, with access to logs and audit trails problematic

•  Significant opportunity for malicious data input and inadequate data validation

20/5/2016 Data Driven Innovation Rome 2016 Page 24

Page 25: Data Analytics for Security Intelligence

Big data privacy concerns

•  De-identifed information may be re-identified

•  Possible deduction of personally identifiable information

•  Risk of data breach is increased

•  "Creepy" Factor: consumers may feel that companies know more about them than they are willing to volunteer

•  Big brother: predictive policing and tracking potential terrorist activities. Harm individual rights or deny consumers important benefits (such as housing or employment) in lieu of credit reports.

http://www.ftc.gov/public-statements/2012/03/big-data-big-issues

Page 26: Data Analytics for Security Intelligence

Outline

•  Big data

•  Advanced threats – current situation

•  Why big data for security?

•  How can big data help?

•  Big data security challenges

•  Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 26

Page 27: Data Analytics for Security Intelligence

Conclusions

20/5/2016 Data Driven Innovation Rome 2016 Page 27

•  As with all new technologies, security in big data use cases seems to be an afterthought at best

•  Big data breaches will be big too, with even more serious reputational damage and legal repercussions

•  All organisations need to invest in research and study of the emerging big data security analytics landscape

•  Big data has the potential to defend against advanced threats, but requires a big re-think of approach

•  Relevant skills are key to successful deployment, only the largest organisations can invest in this now

Page 28: Data Analytics for Security Intelligence

Big data to collect

•  Logs •  Network traffic

•  IT assets

•  Sensitive / valuable information

•  Vulnerabilities

•  Threat intelligence

•  Application behaviour

•  User behaviour

20/5/2016 Data Driven Innovation Rome 2016 Page 28