Your SlideShare is downloading. ×
0
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Improving Cyber-Security Improving Cyber-Security through ...
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Improving Cyber-Security Improving Cyber-Security through ...

1,983

Published on

1 Comment
7 Likes
Statistics
Notes
No Downloads
Views
Total Views
1,983
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
205
Comments
1
Likes
7
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Improving Cyber-Security through Predictive Analysis Peter Frometa SPSS 21 November 2005 Copyright 2003, SPSS Inc. 1
  • 2. Applications of DM & TM in Security Detect Money Identify Cyber Threats Laundering Behavior Identify Insider Threats Detect Fraud Detect Smuggling and Drug Identify True Identity of Trafficking Associations Individuals Predict Non-Compliance Better Allocate Security of Foreign Visitors Resources Ensure Maritime Domain Discover Terrorist Awareness Organization Affiliation Discover Potentially Predict Risk Potential for Suspicious Inbound Cargo Threats to Safety Copyright 2003, SPSS Inc. 2
  • 3. Data Mining Defined What is Data Mining? A hot buzzword for a class of techniques that find patterns or relationships that have not previously been detected A user-centric, interactive process which leverages analysis technologies and computing power Not reliant on an existing database A relatively easy task that requires knowledge of the organization’s problem and subject matter expertise Copyright 2003, SPSS Inc. 3
  • 4. Text Mining Defined What is Text Mining? A user-centric process which leverages analysis technologies and computing power to access valuable information within unstructured text data sources Driven by the use of Natural Language Processing and Linguistic based algorithms…not a search engine No real value unless used in conjunction with Data Mining Ultimately, eliminates need to manually read unstructured data sources Copyright 2003, SPSS Inc. 4
  • 5. Beyond Historical Reporting REACTIVE Historical Reporting What are the top source/destination countries? What are the top attacked products? What are the top offending ISP’s What IP’s have led to the most events? What ports are scanned the most? What are the IDS event counts for the past day, week, month? PROACTIVE Predictive Analytics What activity within the unidentified data of the top source/destination countries is likely to be malicious? Of those identified to be malicious, which is likely to be the worst? What are the characteristics/ vulnerabilities of products likely to be attacked? Which activity did not get flagged that is likely to be malicious? Which flagged items are most likely to be false positives? What can we expect the IDS event counts to be next week, month, etc.? What activity is likely to be associated with worm emergence? Which isolated events are likely to be associated with originating from the same source? Copyright 2003, SPSS Inc. 5
  • 6. NetFlow Data sIP – source IP address (IP address of host that sent the IP packet) dIP – destination IP address sPort – port used by the source IP address dPort – port used by the destination IP address pro – IP protocol (primarily TCP/UDP in this data) packets – packet count bytes – byte count flags – Transfer Control Protocol header flags sTime – start time of flow (GMT) dur – duration of flow (eTime – sTime) eTime – end time of flow (GMT) sr – source name or ID of sensor that picked up the data Copyright 2003, SPSS Inc. 6
  • 7. Where Does Predictive Analytics Fit? Level 1 Analysis Level 2 Analysis Stop an intrusion event Associate multiple similar intrusions Log Data Classify organized intrusions Report Identify state sponsored cyber terror Based on: Net Flow data Net Flow data (source and destination IP address, Response data protocol, packets, bytes, flags…) Correlated Incidents, historical data Keystroke logging other… Copyright 2003, SPSS Inc. 7
  • 8. Data Preparation/Manipulation • Merge • Compare • Re-Classify • Match cases to existing lists of valid IPs • Calculate time between access attempts from same IP • Calculate average bytes passed to same IP • plus other data prep steps depending on desired analysis Copyright 2003, SPSS Inc. 8
  • 9. Cluster Data Mining Predict Associate Copyright 2003, SPSS Inc. 9
  • 10. Cluster Data Mining Predict Associate Copyright 2003, SPSS Inc. 10
  • 11. Cluster Data Mining Predict Associate Copyright 2003, SPSS Inc. 11
  • 12. If… Event 1 takes place, followed by Event 2, followed by Event 3, followed by Given an Intrusion • Event and Alarm Data • Reported Incidents • What event is likely to happen next? • Response Data • Can we be notified before it happens? • Correlated Events • Can we prevent future events earlier in the cycle? Cluster Data Mining Predict Associate Copyright 2003, SPSS Inc. 12
  • 13. Deployment Predictive Analysis as: • an ad-hoc analysis tool • a background process Copyright 2003, SPSS Inc. 13
  • 14. Improving Insider Threat Detection through Predictive Analysis Copyright 2003, SPSS Inc. 14
  • 15. Copyright 2003, SPSS Inc. 15
  • 16. Selected documents are run through Clementine’s linguistics based text extraction engine. Linguistics-based text mining finds meaning in text much as people do—by recognizing a variety of word forms as having similar meanings and by analyzing sentence structure to provide a framework for understanding the text. This approach offers the speed and cost-effectiveness of statistics-based systems, but it offers a far higher degree of accuracy while requiring far less human intervention. Copyright 2003, SPSS Inc. 16
  • 17. Copyright 2003, SPSS Inc. 17
  • 18. Isolated points represent cases where the behavior or characteristics are not similar to any other cases. These anomalies may help us identify suspicious behavior. Copyright 2003, SPSS Inc. 18
  • 19. Copyright 2003, SPSS Inc. 19
  • 20. Copyright 2003, SPSS Inc. 20
  • 21. Final Thoughts and Questions • Visit www.spss.com • Future Questions: • Peter Frometa – pfrometa@spss.com Copyright 2003, SPSS Inc. 21

×