SlideShare a Scribd company logo
1 of 23
Workflow Based Security
Incident Management
Meletis A. Belsis1
, Alkis Simitsis2
, Stefanos Gritzalis1
(1) University of the Aegean
Dept. of Information and Communication Systems Eng.
meletis_belsis@yahoo.com, sgritz@aegean.gr
(2) National Technical University of Athens
Dept. of Electrical and Computer Engineering
asimi@dbnet.ece.ntua.gr
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 2
Outline
 Introduction
 Incident Collection
 ETL Workflows
 System Architecture for the Incident Management
 Conclusions
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 3
Introduction
A Security incident is some set of events that involve an attack
or series of attacks at one or more sites (John D. Howard)
 Security incidents are not an one step process
 a security incident is some set of events
 involves an attack or a series of attacks
 at one or more sites
 may involve one or more criminals
 may take place in different tide
 may take place from different geographical locations
 Storing such incident information is an invaluable tool to users,
administrators and managers.
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 4
Background
 Today many incident databases exist
 Most of them follow the Balkanised Model
 Examples of such include the
 IBM’s VuLDA
 NIST ICAT
 Ohio University IDB
 Many efforts have been made to form a central approach to
incident information storage
 CERT/CC
 Europe S3000
 Open Vulnerability and Assessment Language (OVAL)
 Cerias Incident Response Database (CIRDB)
 Incident Object Description and Exchange Format (IODEF)
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 5
Background
IODEFIODEF Incident Data ModelIncident Data Model
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 6
Motivation
 Current incident databases use different schemas and format.
 Today experts and law enforcement units require the complete
picture of an incident before taking decisions.
 Unfortunately forcing experts around the world to a use common
structure is difficult if possible at all.
 What is needed is an infrastructure that can collect and integrate
information from different incident databases
 Delivering such a structure incorporates providing solutions to
a number of problems
 gathering
 export snapshots/differentials
 transportation
 transformations
 cleaning issues
 efficient loading
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 7
Contributions
 We employ advance database techniques to tackle the
problem of designing a centralized incident DBMS
 We identify the main problems that are underlying the
population of a central incident database
 We propose a method based on ETL workflows for the
incremental maintenance of such a centralized
database
 We present a framework for incident correlation in
order to keep track of a full attack that its component
incidents are stored in different databases
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 8
Outline
 Introduction
 Incident Collection
 ETL Workflows
 System Architecture for the Incident Management
 Conclusions
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 9
Incident Collection
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 10
Incident Collection
 In terms of the transformation tasks, there are two
main classes of problems
 conflicts and problems at the schema level
 data level transformations (i.e., at the instance level)
 More specifically
 Naming conflicts
 homonyms
 synonyms
 Structural conflicts
 Data formatting
 String Problems
 ‘Hewlett Packard’ vs. ‘HP’ vs. ‘Hioulet Pakard’
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 11
Incident Collection
 A problem
 the time window for the population of the centralized
database is rather too small to repeat the same job
more than once
 ... a solution
 instead of extracting, transforming, and loading all the
data, we are interested only to those incident records
that have been changed during the last execution of the
process
 this means that we are interested only to the incident
data that are
 newly inserted
 updated
 deleted
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 12
Outline
 Introduction
 Incident Collection
 ETL Workflows
 System Architecture for the Incident Management
 Conclusions
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 13
ETL Workflows
 μαζί με το σχήμα λες τα εξής:
In this figure we abstractly describe the general framework for
ETL workflows.
In the left side, we can observe the original data stores (Sources)
that are involved in the overall process. Typically, data sources
are relational databases and files.
The data from these sources are extracted by specialized
routines or tools, which provide either complete snapshots or
differentials of the data sources.
Then, these data are propagated to the data staging area (DSA)
where they are transformed and cleaned before being loaded into
the data warehouse. Intermediate results, again in the form of
(mostly) files or relational tables are part of the data staging area.
The central database DW is depicted in the right part of figure
and comprises the target data stores. The loading of the central
warehouse is performed from the loading activities depicted in
the right side before the DW data store.
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 14
ETL Workflows
More informations can be found at:
http://www.dblab.ntua.gr/~asimi/
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 15
ETL Workflows
 Extraction-Transformation-Loading (ETL) tools
 can be used to facilitate the population of a centralized
incident database from several different incident DBs
 are pieces of software responsible for the extraction of data
from several sources, their cleansing, their customization,
their transformation in order to fit business needs, and finally,
their loading into a central DB
 their most prominent tasks include
 the identification of relevant information at the source side
 the extraction of this information
 the transportation of this information to the Data Staging Area
(DSA), where all the transformations take place
 the transformation, (i.e., customization and integration) of the
information coming from multiple sources into a common format
 the cleaning of the resulting data set, on the basis of database
and business rules
 the propagation and loading of the data to a central DB
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 16
Outline
 Introduction
 Incident Collection
 ETL Workflows
 System Architecture for the Incident Management
 Conclusions
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 17
System Architecture
 The system proposed, is based on the
OMG’s CORBAOMG’s CORBA architecture.
 CORBA allows for the addition of new
services on demand.
 CORBA is transperent from client
applications, OS, and platform.
 Registered law enforcement units will
be able to access incident information
through the WEB
 Data are going to be collected from
CSIRT databases on a daily basis www.dcs.fmph.uniba.skwww.dcs.fmph.uniba.sk
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 18
System Architecture
 Incident data are protected
during transit using the
CORBA’s Security Service
Protocol (SECP) using the SSL
protocol
 The final Corba’s security API
will provide Security at level 3level 3
with a Common SecureCommon Secure
Interoperability at level 0Interoperability at level 0 in order
to disallow privilege delegation.
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 19
System Architecture
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 20
Outline
 Introduction
 Incident Collection
 ETL Workflows
 System Architecture for the Incident Management
 Conclusions
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 21
Conclusions
 This research delivers a framework for automated
incident information collection.
 The collection and correlation of incident related data
is vital
 Incident data collected from different sources need to
be cleaned and homogenized before a centrally
stored.
 We try to minimize the time window between the
appearance of an incident and its worldwide
publication.
 Automated correlation of incident information will allow
law enforcement units to pursuit the criminals
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 22
Future Work
 Select an incident structure able to store information
received from diverse databases
 Currently we review two potential candidates :IODEF
and IDM.
 Optimization of the ETL process to enable incident
information correlation during the collection process
 Correlation of information stored on the central
database using data mining techniques
 Allow the public community to securely access
incident information using database personalized
views
M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 23
Thank You!

More Related Content

Similar to Meletis Belsis - Workflow based Incident Management Model

Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonEMC
 
91649526 management-information-system
91649526 management-information-system91649526 management-information-system
91649526 management-information-systemAbhilash Bhaskar
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeEMC
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Museum Collections Management: Possibilities for Access and Use with Linked D...
Museum Collections Management: Possibilities for Access and Use with Linked D...Museum Collections Management: Possibilities for Access and Use with Linked D...
Museum Collections Management: Possibilities for Access and Use with Linked D...cbogen
 
ICPSR Data Managment
ICPSR Data ManagmentICPSR Data Managment
ICPSR Data ManagmentICPSR
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityLilminow
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword EU Project
 
Total Cost of Ownership Evaluation for Network Centric Systems of Systems
Total Cost of Ownership Evaluation for Network Centric Systems of SystemsTotal Cost of Ownership Evaluation for Network Centric Systems of Systems
Total Cost of Ownership Evaluation for Network Centric Systems of SystemsMarco Lisi
 
sect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptsect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptRuhailAhmed5
 
ch7--net_security.ppt
ch7--net_security.pptch7--net_security.ppt
ch7--net_security.pptssusera1b6c7
 
sect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptsect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptssuserec53e73
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Chapter 2 Architecture (updated).pptx
Chapter 2  Architecture (updated).pptxChapter 2  Architecture (updated).pptx
Chapter 2 Architecture (updated).pptxTadeseBeyene
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source DatabasesGazzang
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 

Similar to Meletis Belsis - Workflow based Incident Management Model (20)

Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
 
91649526 management-information-system
91649526 management-information-system91649526 management-information-system
91649526 management-information-system
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data Lake
 
Management information system 2
Management information system 2Management information system 2
Management information system 2
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Museum Collections Management: Possibilities for Access and Use with Linked D...
Museum Collections Management: Possibilities for Access and Use with Linked D...Museum Collections Management: Possibilities for Access and Use with Linked D...
Museum Collections Management: Possibilities for Access and Use with Linked D...
 
ICPSR Data Managment
ICPSR Data ManagmentICPSR Data Managment
ICPSR Data Managment
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
 
Intro ds 1
Intro ds 1Intro ds 1
Intro ds 1
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Total Cost of Ownership Evaluation for Network Centric Systems of Systems
Total Cost of Ownership Evaluation for Network Centric Systems of SystemsTotal Cost of Ownership Evaluation for Network Centric Systems of Systems
Total Cost of Ownership Evaluation for Network Centric Systems of Systems
 
sect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptsect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.ppt
 
ch7--net_security.ppt
ch7--net_security.pptch7--net_security.ppt
ch7--net_security.ppt
 
sect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.pptsect5--SHORT--ch7--net_security-part2.ppt
sect5--SHORT--ch7--net_security-part2.ppt
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Chapter 2 Architecture (updated).pptx
Chapter 2  Architecture (updated).pptxChapter 2  Architecture (updated).pptx
Chapter 2 Architecture (updated).pptx
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 

More from Meletis Belsis MPhil/MRes/BSc

More from Meletis Belsis MPhil/MRes/BSc (7)

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Meletis Belsis - IMS Security
Meletis Belsis - IMS SecurityMeletis Belsis - IMS Security
Meletis Belsis - IMS Security
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Meletis Belsis - Workflow based Incident Management Model

  • 1. Workflow Based Security Incident Management Meletis A. Belsis1 , Alkis Simitsis2 , Stefanos Gritzalis1 (1) University of the Aegean Dept. of Information and Communication Systems Eng. meletis_belsis@yahoo.com, sgritz@aegean.gr (2) National Technical University of Athens Dept. of Electrical and Computer Engineering asimi@dbnet.ece.ntua.gr
  • 2. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 2 Outline  Introduction  Incident Collection  ETL Workflows  System Architecture for the Incident Management  Conclusions
  • 3. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 3 Introduction A Security incident is some set of events that involve an attack or series of attacks at one or more sites (John D. Howard)  Security incidents are not an one step process  a security incident is some set of events  involves an attack or a series of attacks  at one or more sites  may involve one or more criminals  may take place in different tide  may take place from different geographical locations  Storing such incident information is an invaluable tool to users, administrators and managers.
  • 4. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 4 Background  Today many incident databases exist  Most of them follow the Balkanised Model  Examples of such include the  IBM’s VuLDA  NIST ICAT  Ohio University IDB  Many efforts have been made to form a central approach to incident information storage  CERT/CC  Europe S3000  Open Vulnerability and Assessment Language (OVAL)  Cerias Incident Response Database (CIRDB)  Incident Object Description and Exchange Format (IODEF)
  • 5. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 5 Background IODEFIODEF Incident Data ModelIncident Data Model
  • 6. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 6 Motivation  Current incident databases use different schemas and format.  Today experts and law enforcement units require the complete picture of an incident before taking decisions.  Unfortunately forcing experts around the world to a use common structure is difficult if possible at all.  What is needed is an infrastructure that can collect and integrate information from different incident databases  Delivering such a structure incorporates providing solutions to a number of problems  gathering  export snapshots/differentials  transportation  transformations  cleaning issues  efficient loading
  • 7. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 7 Contributions  We employ advance database techniques to tackle the problem of designing a centralized incident DBMS  We identify the main problems that are underlying the population of a central incident database  We propose a method based on ETL workflows for the incremental maintenance of such a centralized database  We present a framework for incident correlation in order to keep track of a full attack that its component incidents are stored in different databases
  • 8. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 8 Outline  Introduction  Incident Collection  ETL Workflows  System Architecture for the Incident Management  Conclusions
  • 9. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 9 Incident Collection
  • 10. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 10 Incident Collection  In terms of the transformation tasks, there are two main classes of problems  conflicts and problems at the schema level  data level transformations (i.e., at the instance level)  More specifically  Naming conflicts  homonyms  synonyms  Structural conflicts  Data formatting  String Problems  ‘Hewlett Packard’ vs. ‘HP’ vs. ‘Hioulet Pakard’
  • 11. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 11 Incident Collection  A problem  the time window for the population of the centralized database is rather too small to repeat the same job more than once  ... a solution  instead of extracting, transforming, and loading all the data, we are interested only to those incident records that have been changed during the last execution of the process  this means that we are interested only to the incident data that are  newly inserted  updated  deleted
  • 12. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 12 Outline  Introduction  Incident Collection  ETL Workflows  System Architecture for the Incident Management  Conclusions
  • 13. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 13 ETL Workflows  μαζί με το σχήμα λες τα εξής: In this figure we abstractly describe the general framework for ETL workflows. In the left side, we can observe the original data stores (Sources) that are involved in the overall process. Typically, data sources are relational databases and files. The data from these sources are extracted by specialized routines or tools, which provide either complete snapshots or differentials of the data sources. Then, these data are propagated to the data staging area (DSA) where they are transformed and cleaned before being loaded into the data warehouse. Intermediate results, again in the form of (mostly) files or relational tables are part of the data staging area. The central database DW is depicted in the right part of figure and comprises the target data stores. The loading of the central warehouse is performed from the loading activities depicted in the right side before the DW data store.
  • 14. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 14 ETL Workflows More informations can be found at: http://www.dblab.ntua.gr/~asimi/
  • 15. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 15 ETL Workflows  Extraction-Transformation-Loading (ETL) tools  can be used to facilitate the population of a centralized incident database from several different incident DBs  are pieces of software responsible for the extraction of data from several sources, their cleansing, their customization, their transformation in order to fit business needs, and finally, their loading into a central DB  their most prominent tasks include  the identification of relevant information at the source side  the extraction of this information  the transportation of this information to the Data Staging Area (DSA), where all the transformations take place  the transformation, (i.e., customization and integration) of the information coming from multiple sources into a common format  the cleaning of the resulting data set, on the basis of database and business rules  the propagation and loading of the data to a central DB
  • 16. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 16 Outline  Introduction  Incident Collection  ETL Workflows  System Architecture for the Incident Management  Conclusions
  • 17. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 17 System Architecture  The system proposed, is based on the OMG’s CORBAOMG’s CORBA architecture.  CORBA allows for the addition of new services on demand.  CORBA is transperent from client applications, OS, and platform.  Registered law enforcement units will be able to access incident information through the WEB  Data are going to be collected from CSIRT databases on a daily basis www.dcs.fmph.uniba.skwww.dcs.fmph.uniba.sk
  • 18. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 18 System Architecture  Incident data are protected during transit using the CORBA’s Security Service Protocol (SECP) using the SSL protocol  The final Corba’s security API will provide Security at level 3level 3 with a Common SecureCommon Secure Interoperability at level 0Interoperability at level 0 in order to disallow privilege delegation.
  • 19. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 19 System Architecture
  • 20. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 20 Outline  Introduction  Incident Collection  ETL Workflows  System Architecture for the Incident Management  Conclusions
  • 21. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 21 Conclusions  This research delivers a framework for automated incident information collection.  The collection and correlation of incident related data is vital  Incident data collected from different sources need to be cleaned and homogenized before a centrally stored.  We try to minimize the time window between the appearance of an incident and its worldwide publication.  Automated correlation of incident information will allow law enforcement units to pursuit the criminals
  • 22. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 22 Future Work  Select an incident structure able to store information received from diverse databases  Currently we review two potential candidates :IODEF and IDM.  Optimization of the ETL process to enable incident information correlation during the collection process  Correlation of information stored on the central database using data mining techniques  Allow the public community to securely access incident information using database personalized views
  • 23. M. Belsis, A. Simitsis, S. Gritzalis @ PCI'05, Volos, 13/11/2005 23 Thank You!