• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
SplunkLive! Splunk for Insider Threats and Fraud Detection
 

SplunkLive! Splunk for Insider Threats and Fraud Detection

on

  • 1,570 views

 

Statistics

Views

Total Views
1,570
Views on SlideShare
1,570
Embed Views
0

Actions

Likes
2
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Splunk now has more than 850 employees worldwide, with headquarters in San Francisco and 14 offices around the world.Since first shipping its software in 2006, Splunk now has over 6,000 customers in 90+ countries. These organizations are using Splunk software to improve service levels, reduce operations costs, mitigate security risks, enable compliance, enhance DevOps collaboration and create new product and service offerings. Please always refer to latest company data found here: http://www.splunk.com/company.
  • At Splunk, our mission is to make machine data accessible, usable and valuable to everyone. Andthis overarching mission is what drives our company and product priorities.
  • Data is growing and embodies new characteristics not found in traditional structured data:Volume, Velocity, Variety, Variability/Veracity.Machine data is one of the fastest, growing, most complex and most valuable segments of big data.All the webservers, applications, network devices – all of the technology infrastructure running an enterprise or organization – generates massive streams of data, in an array of unpredictable formats that are difficult to process and analyze by traditional methods or in a timely manner. Why is this “machine data” valuable? Because it contains a trace - a categorical record - of user behavior, cyber-security risks, application behavior, service levels, fraudulent activity and customer experience.
  • Ponemon Institute 2012.
  • Patrick Reidy CISO FBI
  • The broken window theory says that if someone breaks a window and they don’t see an indication of notice or any repercussion they determine that no one cares and they’ll likely do it again. It’s the same with access to systems or documents.
  • Bank of America
  • Bank of America
  • Intuit
  • Intuit
  • Etsy, the online marketplace, has spoken at numerous Splunk events around how they use Splunk for fraud detection, security, compliance, and IT operations. Public info is at:http://www.splunk.com/view/SP-CAAAGH3http://codeascraft.com/2013/06/04/leveraging-big-data-to-create-more-secure-web-applications/
  • Fidelity Investments
  • CricketStubhub
  • MetroPCS

SplunkLive! Splunk for Insider Threats and Fraud Detection SplunkLive! Splunk for Insider Threats and Fraud Detection Presentation Transcript

  • Copyright © 2013 Splunk Inc. Splunk for Insider Threats and Fraud Detection
  • Company Company (NASDAQ: SPLK) Founded 2004, first software release in 2006 HQ: San Francisco / Regional HQ: London, Hong Kong Over 850 employees, based in 12 countries Annual Revenue: $198M (YoY +60%) $5+ billion market valuation Business Model / Products Free download to massive scale On-premise, in the cloud and SaaS 6,000+ Customers; 2500 w/Security Use Cases Customers in over 90 countries 60 of the Fortune 100 Fast Company 2013: Named Splunk #4 Most Innovative Company in the World and #1 Big Data Innovator Largest license: 100 Terabytes per day Leader: Gartner SIEM Magic Quadrant, 2013 2
  • Make machine data accessible, usable and valuable to everyone. 3
  • The Accelerating Pace of Data Volume | Velocity | Variety | Variability GPS, RFID, Hypervisor, data Web Servers, Email, Messaging, Clickstreams, Mobile, Telephony, IVR, Databases, Sensors, Telematics, Storage, Servers, Security Devices, Desktops Machine data is fastest growing, most complex, most valuable area of big 4
  • Machine Generated Data is a Definitive Record of Human-to-Machine and Machineto-Machine Interaction 5
  • Insider Threats – Employee Attitudes 52 • Percent of employees don’t believe it’s a crime to use competitor’s confidential information 44 • Percent believe a software developer who develops source code for a company has some ownership of work and inventions beyond their current employer 42 • Percent don’t think it is a crime to reuse source code with out permission from a former employer, in projects for other companies 60 • Percent say a co-worker hired from a competing company has offered documents from that company for their use Ponemon Institute Survey 2012 6
  • Employee Insider threats Are Authorized users Doing authorized things Have malicious intent A ‘people centric’ behavioral problem Are not Hackers using specialized tools A technical or "cybersecurity" issue alone Escalating their privileges for purposes of espionage
  • Context for Insider Threats • Who are your privileged internal people? • Who might be a likely enemy? • What data that would be at risk? Contextual Cyber Psychological Insider Threat Risk 8
  • Two Strategies for Combating Secondary Detection Primary Prevention/Deterrence • Pattern based • Specific indicators or alerts • Multiple factors • Definitive evidence • Uses heuristics and statistical models • Physical detection (stolen documents) • Requires base lining / watching for outlier behaviors “Rather than getting wrapped up in prediction or detection organizations should start first with deterrence.” Patrick Reidy CISO FBI 9
  • Splunk and the broken window theory Some employees test the limits of their access Employee feedback required for all unauthorized attempts (accidental or not). Splunk monitors access in realtime Splunk sends email (via script) to employee indicating awareness of attempt 10
  • Examples: Correlations / Detections / Context Detection Indicator Analysis Printer usage Number of print jobs over a given period of time Outlier Increase in size of print jobs Outlier Unusual times of day Outlier Rare network printer use (the one not closest employee Outlier Local vs. remote Outlier Time of day Outlier During vacation times Outlier Monitor’s employee behavior and attitude changes (proxy data) Outlier/Context Logins to AD or use of SSO Abrupt change in the ratio of website categories visited 11
  • Examples: Correlations / Detections / Context Detection Indicator Unused Vacation - 18 months or longer Employee remains in control -- work not turned over to others for review Context / Lookup Always first in / first out of the office Badge data and/or AD. Desire to control situation Context / Lookup Personal life change – marital status change stress trigger Can jeopardize emotional stability – HR system data Context / Lookup Lay-off notification Monitor for file transfers by individuals that occur immediately after lay-offs are announced Context / Lookup Attempted changes to document classifications Document metadata Direct indicator Attempts to use USB or CD Rom Log data events Direct indicator 12
  • Insider Threat Use Case: Disgruntled Employee Splunk at a Large Aerospace and Defense Contractor Goal: Protect intellectual property at the hands of disgruntled employee Use Case Scenario: In an environment where employees are sometimes mis-treated, fired, reprimanded you never know when an employee has become disgruntle. Think of an employee receiving a "pink slip" and decides before his last day he wants to take company proprietary data…from SharePoint servers…Below explains how Splunk could be use to detect/mitigate that type of behavior: Data Sources: Host based FW logs, Single Sign-on(SSO) logs, SharePoint connection logs, Content Logic Steps: 1. Upload all employees who received pink slips "login id's" to Splunk' s look-up table 2. Run trending reports on "id's" for the past 6 months 3. Correlate data sources with trend reports 4. Report on suspicious user id's who has increase downloads from SharePoint servers Splunk Capabilities: lookup, trends, reports, real-time alerts, index, correlation analytics, real-time rules 13
  • Insider Threat Use Case: Data Leakage/Spill Splunk at a Large Aerospace and Defense Contractor Goal: To detect/monitor potential data leakage/spill of very sensitive intellectual property Use Case Scenario: In an environment where employees are Govt contractors who has access to sensitive R&D projects and/or supporting Govt programs, data leakage is highly likable. An employee can intentional/unintentional download any text docs associated to that program/project to personal laptop, personal email, etc. Below explains Data Sources: Data Loss prevention (DLP) logs, key words, email logs, Anti-virus logs(USB) Content Logic Steps: 1.Upload "program keywords" and "user ids" in Splunk's lookup table 2. correlate data sources/lookup table 3. Develop/Report on alerts (rule hits) 4. Developed alert visualization & monitor Data Sources: Data Loss prevention (DLP) logs, key words, email logs, AV, Splunk Capabilities: lookup, search processing language, real-time alerts, reports, visualization, advance correlation, real-time rules 14
  • “Fraud is the daughter of greed.” ― Jonathan Gash, The Great California Game 15
  • Splunk for Fraud Detection Across Verticals Financial Services eCommerce Mobile / Wireless Fraud Detections 16 Online Education “Fraud is the daughter of greed.” ― Jonathan Gash, The Great California Game
  • Online Education Company – Fraud Background Use Case Before Splunk After Splunk Classroom activity / fraud Affects accreditation Difficult to identify fraudulent student loan and attendance activity accurately Complete visibility to classroom activity and increased confidence that financial aid fraud is being detected thoroughly Seats not taken from legit students Internet browsing history Bluecoat Reporter had so Faster and lower cost response to much data it stopped internal production requests and working making them unable data costs to report on this for HR 17
  • Online Education Company– Detections Benefits Use Case After Splunk Classroom activity / fraud Affects accreditation $10s of Millions of fraudulent funds have been stopped from being distributed Internet browsing history Saves 75-90% of the Corporate Forensics team’s efforts (can offer more services) Reputation and Dept. of Education accreditation maintained seamlessly Saves $45,000/year in external production services (external Legal) Saves $1.5M/year in data processing costs (process, collect, cull, review, etc.) 18
  • Cash Wire Transfer Company Subsidiary of Major Financial Institution With targeted and ever evolving fraud techniques, number of fraud attempts and amounts rise rapidly, Splunk was introduced to fill a detection gap in June 2012 • Splunk agility to react to emerging fraud patterns saved millions for the bank • Broader view Splunk introduced is able us to quickly identify fraud techniques, discover and fix design flaws in applications • – 11 detection rules deployed – 2 application flaws were discovered and fixed
  • Cash Wire Transfer Company - Fraud Detection 12/2012 – 4/15/2013 Payment Amount Total Splunk Detected Attempted Stopped Splunk & Other methods Splunk Alone Total Recovered Net Loss $33.5 MM $27.5 MM $ 6 MM $5 MM $ 15 MM $13 MM $ 2 MM $ 1.7 MM Recovered 14.41% Loss 3.62% $1 MM $ 0.2 MM Actual Loss Attempted Other Detection methods Released Net Loss $18,5 MM $ 1 MM Stopped $14 MM 52% Stopped Recovered Recovered $ 3 MM $5 MM $0.2 MM $ 3.4 MM 12% $10 MM $0.00 $ 9.8 MM 36% $ 0.2 MM $33.5 MM $1 MM $27.5 MM $ 5 MM Stopped 81.97% $ 1.3 MM • Attempted: payments created or released Stopped: payments didn’t leave the bank • Released: payments were out of the bank • Recovered: payments were recalled back • Net loss: payments were cashed out $35,000,000.00 $30,000,000.00 $25,000,000.00 $20,000,000.00 $15,000,000.00 $10,000,000.00 $5,000,000.00 $0.00 Splunk Alone Splunk & Other methods Other Detection methods
  • Intuit Financial Services - Fraud Background • We noticed a similar fraud pattern across 15 banks • Then we mapped them to see they were within 15 miles of one another • Fraud was coming from one data processing vendor who they all shared 21
  • Intuit Financial Services Organization -- Wire Transfers Watching fraudster in real-time—seeing $5M, $7M, $8M wire attempts • Splunk exposed every element of our infrastructure that he touched • Next we could correlate activities based on time to understand his pattern of activity • 22
  • Detecting Fraud at Etsy – Sample patterns of possible fraud:      User traffic coming from “rent a VM”, cloud-based services Brute force password guessing Single IP excessively selecting the “I forgot my password” option for several accounts Abnormally large payments, or very high velocity of payments, from a single account Customer info that should be stable changing often: email/physical address, payment card, etc – Automatically lock accounts that appear to be compromised – Weave Splunk data into customer service tools so CSRs also see fraud indicators – Use Splunk for fraud, security, compliance, IT Ops, and app mgmt 2 3
  • East Coast Financial Services: Use of Splunk for Fraud Investigations Phish detection – 500+ customers protected and ~$5M saved – – Used to be done 100% by customers; log files weren’t available for searching for 1 day Use Splunk to detect the patterns with referrers who are testing their phish to see if it works Malware detection – 14 detections stopped $140K – – This use case used data already indexed in Splunk…no incremental cost Using Splunk to research and detect anomalies within logs specific to malware/web injects Alert and block the PIN within 10 minutes of identification and before account access Trading on uncollected funds - ~500 customers protected, stopping over $4.5M – – – This takes place when a customer places a trade before money transfers in clear Without Splunk they had to wait a day to get access to this data for analysis Fastest detection and PIN block was 37 seconds Online Bank Wire fraud – blocked 60+ incidents saving over $240k – – Transaction completion involves a code sent to a mobile phone, detecting now every 5 minutes Actually detected an occurrence of this before the capability went live with customers 24
  • Other Companies • Using Splunk to track unauthorized cell phone activations at franchiser locations Online Ticket Reseller • Using web log patterns to determine fraudulent buyer and sellers On-Line 25
  • Other Companies • Monitoring for anomalous usage patterns based on plans. An open international call connection for multiple hours, discovered a fraud ring selling intl. calling. On-line Educational Institution • Using Splunk to track academic and financial aid fraud use weblogs and session IDs. Students that are flagged come up on a list for investigation 26
  • Thank You