SlideShare a Scribd company logo
1 of 30
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
MATATABI : Cyber Threat
Analysis and Defense Platform
using Huge Amount of Datasets
Yuji Sekiya*
*The University of Tokyo, Japan
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Multi-layer Threat Analysis
Victim side action
Filtering
Load balancing
Isolation
Countermeasure for Attackers
Report to ISP
Announce to users
Filtering at ISP level
Configuration to servers
Data collection at
Multiple layers/locations
Network device
Servers
Users Device
Analysis Platform
Analysis 1
Analysis 2
Analysis 3
Threat analysis (detection) across
multiple datasources
Threat Information Share
Among organizations
Announce to public
2
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Security Information Pipeline
๏‚ง Making pipeline through divert activities
๏‚ง Data collection (Traffic, User behavior, etc)
๏‚ง Threat Analysis
๏‚ง Human decision
๏‚ง Protection (Enforcement)
ProtectionData Analysis
Human
Inputs
3
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Datasets
4
MATATABI
Switch
Router
DNS
Firewall
SPAM
Phishing Site
External
Information
sFlow
NetFlow
URL
SPAM Sender
URL
syslog
querylog
pcap
text
URL
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Data Volume
N*10GByte/day
20TB/10months
Traffic sampling
Packet dump
E-mail
DNS
Web traffic
5
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
1. Forensics : preserving log data
๏‚ง To keep evidences as traceable.
๏‚ง To analyze multi-source data exhaustively
2. Scalability : should be tolerable to huge data
๏‚ง To store a huge amount of datasets
๏‚ง To process datasets in a reasonable time
3. Real-time analysis : processing performance
๏‚ง Possibly real-time analysis of any datasets
4. Uniform programmability :
๏‚ง Various data format should be easily accessible
๏‚ง Various analysis program can be used
Goals of MATATABI
6
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
NECOMA ECO System
Infrastructure
Data
End Point
Data
API API
Analysis Module /
Early Warning System
API
Threat
Information
Sharing
External
Knowledge DB
API
Crawler
API
External
Resource (web)
Infrastructure
Devices
End Point
Devices
API API
Resilience Mechanism
API
Get external
threat information
Get data
Put analysis results
Get threat
information
and other
results Get threat information
Control infrastructure and
end point devices
Crawling external resource
and extracting knowledge
Collection Probe Collection Probe
Get data
Petsas et al., A Trusted Knowledge Management System for
Multi-layer Threat Analysis. TRUST 14โ€™ (poster session), June 2014
7
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
s๏ฌ‚ow
net๏ฌ‚ow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
๏‚ง 4 components
1) Storage
2) Data import/process module
3) Analysis module
4) Application Programming Interface (API)
MATATABI Overview
8
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Built by Open-Source Software
๏‚ง Actively using open-sourced software
๏‚ง Apace Hadoop (HDFS, MapReduce, etc)
๏‚ง Apache Hive (SQL-like language => distributed jobs)
๏‚ง Facebook Presto (Distributed SQL engine)
๏‚ง Apache Mahout (Machine learning library)
๏‚ง Apache Thrift (Language bindings)
๏‚ง Hadoop-pcap (pcap file parser)
๏‚ง Fixed issues and packaged by NECOMA
๏‚ง https://github.com/necoma
9
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
1) Storage
๏‚ง Storing measured data
to Hadoop Distributed
FileSystem (HDFS)
๏‚ง Easily scaled-out
โ€ข Data access by tools
โ€“ Hive/Presto-db
โ€“ Hadoop-pcap
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
s๏ฌ‚ow
net๏ฌ‚ow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
10
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
2) Data import module
๏‚ง Pre-processing
measurement data
โ€ข By each dataset
โ€“ Raw data (e.g., pcap)
โ€“ Converting to Hive tables
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
s๏ฌ‚ow
net๏ฌ‚ow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
11
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
3) (Threat) Analysis module
๏‚ง Easily implement-able
๏‚ง Bunch of analysis
๏‚ง Distributed computations
(MapReduce)
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
s๏ฌ‚ow
net๏ฌ‚ow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
12
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
4) Application Programming Interface (API)
๏‚ง Export analysis results
๏‚ง Export dataset itself (if
needed)
๏‚ง Implemented with n6
REST API
๏‚ง JSON/CSV/IODEF format
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
s๏ฌ‚ow
net๏ฌ‚ow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
13
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Analysis Modules (Use cases)
14
Name Datasets Frequency LoC
(#lines)
Remark
ZeuS DGA detector DNS pcap, netflow daily 25 hadoop-pcap
UDP fragmentation detector sflow daily 48
Phishing likelihood calculator Phishing URLs,
Phishing content
1-shot โ€“
Mahout
(RandomForest)
NTP amplifier detector
netflow, sflow daily 143
pyhive, Maxmind
GeoIP
sflow daily 24
DNS amplifier detector sflow, open resolver
[19]
daily 37
Anomalous heavy-hitter
detector
netflow, sflow daily 106
pyhive
DNS anomaly detection DNS pcap, whois,
malicious/legitimate
domain list
daily 57
hadoop-pcap, Mahout
(RandomForest)
SSL scan detector sflow 1-shot 36
DNS failure graph analysis DNS pcap daily 159 pyhive
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
โ€ข Make a SQL request by Presto
โ€ข Get IP addresses that sends UDP traffic on
port 123 with a packet size = 468
โ€ข Packet size of Monlist reply = 468 bytes
15
Analysis Example (1)
Finding NTP Amplifiers
SELECT sa FROM netflow WHERE sp=123 AND pr='UDP' AND
ibyt/ipkt=468 GROUP BY sa
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
presto:default> SELECT sa FROM netflow_wide_rcfile WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 AND
dt>'20150401' GROUP BY sa;
Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits
0:11 [ 457M rows, 9.8GB] [41.3M rows/s, 908MB/s] [======>>>>>> ] 14%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 1.88K 135 33.2K 2.39K 0 8 0
2.....R 457M 32.9M 9.8G 723M 622 94 120
Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits
1:05 [1.63B rows, 37.7GB] [25.2M rows/s, 596MB/s] [===========================>>>>>>>> ] 64%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 16.9K 260 299K 4.61K 0 8 0
2.....R 1.63B 25.1M 37.7G 595M 147 147 542
16
Analysis Example (1)
Finding NTP Amplifiers
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
sa
-----------------
17
Analysis Example (1)
Finding NTP Amplifiers
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 18
Analysis Example (2)
Detecting DNS Amplifier Attacks
Open Resolver
DNS Server
Attackers
Spoofed Packets
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
๏‚ง Found Response with RD(Recursive Desired)
flag.
๏‚ง Queries from Open Resolver Servers
๏‚ง Attempts of the Water Torture Attack
select src,count(*) from dns_pcaps where dt='20150401' and dns_qr=true and
dns_flags like '%rd%' and server=โ€˜dns1-pcapโ€™ group by src;
Analysis Example (2)
Detecting DNS Amplifier Attacks
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 20
Authoritative
DNS Servers
Resolver
DNS Server
Attackers
Spoofed
Answers
Analysis Example (3)
Detecting DNS Cache Poisoning Attacks
Query
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Analysis Example (3)
Detecting DNS Cache Poisoning Attacks
๏‚ง Normally
# of query from resolver server > # of query to resolver server
๏‚ง Counting number of queries from resolver server
๏‚ง Counting number of answers to resolver server
๏‚ง If not, it is possibly ddos or cache poisoning attack
against our DNS resolver server
select floor(ts/60),count(*) from dns_pcaps where dt = '20150401โ€™ and dns_qr=false and
dns_flags not like โ€˜%rd%โ€™ and server=โ€™ns1-pcapโ€˜ group by floor(ts/60);
select floor(ts/60),count(*) from dns_pcaps where dt = '20150401โ€™ and dns_qr=true and
dns_flags like โ€˜%aa%โ€™ and server=โ€˜ns1-pcapโ€™ group by floor(ts/60);
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Detecting Botnet infected hosts
by DGA Queries
22
โ€ข Domain Generation
Algorithm (DGA)
โ€“ Auto generated domain
names used by botnets
โ€“ Usually the names are
changed in a short span
โ€“ Difficult to detect botnets
hosts by domain name.
โ€ข ZeuS-DGA
โ€“ [a-z0-
9]{32,48}.(ru|com|biz|info|o
rg|net)
โ€“ Example๏ผš
f528764d624db129b32c21fbc
a0cb8d6.com
001: gh3t852dwps7v47v4139eid62g190bjrs
002: g22tdk3q8097o97fcs0j46fe0l7wc56us
003: gj9d611364m0ysceiq0x250fm5u69zq5s
:
botmaster
bot
domain list: periodically generate
001: gh3t852dwps7v47v4139eid62g190bjrs
002: g22tdk3q8097o97fcs0j46fe0l7wc56us
003: gj9d611364m0ysceiq0x250fm5u69zq5s
:
domain list: periodically generate
g22tdk3q8097o97fcs0j46fe0l7wc56us.ru
001.ru 001.com 002.ru
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
๏‚ง Found specific regular expression type in
queries
๏‚ง Some botnet clients generate dynamic,
randomized DNS name to contact botnet
C&C servers (so called DGA)
select src,dns_question from dns_pcaps where regexp_like (dns_question,
'[a-z0-9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question,
'xn--') AND dt='20150401';
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
presto:default> select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0-
9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt>'20150401';
Query 20150810_114848_00226_u378i, RUNNING, 11 nodes, 1,435 splits
1:17 [ 123M rows, 4.15GB] [1.61M rows/s, 55.5MB/s] [ <=> ]
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......S 123M 1.61M 4.15G 55.5M 1100 217 117
Query 20150810_115500_00228_u378i, RUNNING, 11 nodes, 143 splits
2:22 [87.4M rows, 4.73GB] [ 615K rows/s, 34.1MB/s] [========================================>>] 93%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 87.4M 615K 4.73G 34.1M 0 9 133
24
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
2001:XXXX:1d8:0:0:0:0:106 | cg79wo20kl92doowfn01oqpo9mdieowv5tyj. 0 IN A
2001:XXXX:0:1:0:0:0:f | cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com. 0 IN A
157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
23.XXX.104.44 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
23.XXX.111.231 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
173.XXX.59.40 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
192.XXX.79.30 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
185.XXX.155.12 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
173.XXX.58.45 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
25
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Movie : Zeus-DGA Analysis
26
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Visualization of Zeus DGA and Botnet
๏‚ง 2015/07/01 โ€“ 2015/07/05
๏‚ง The number of the most active DGA query is 23
๏‚ง Related traffic flows from netflow datasets.
27
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Visualization : Zeus-DGA Distribution
28
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
One of Protection Methods
๏‚ง SDN IX (PIX-IE)
๏‚ง Programmable IX in Edo : PIX-IE
๏‚ง Mitigating and filtering suspicious flows at IX
๏‚ง IX is a public space in the Internet
๏‚ง Before link saturation, an ISP operator can stop DDoS
flows
29
Programmable IX
(PIX-IE)
ISP
ISP ISP
ISP
ISP
ISP
Vic m
ISP Vic m Service
Spoofed SRC UDP
Link
Satura on
The operator has to contact to
each ISP, and ask to filter the
DDoS packets โ€ฆ
Human
Interac on
Programmable IX
(PIX-IE)
ISP
ISP ISP
ISP
ISP
ISP
Vic m
ISP Vic m Service
Mi ga on
Mi ga on
Mi ga on
Mi ga on
REST API
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Summary and Ongoing Work
๏‚ง MATATABI: a platform for threat analysis
๏‚ง Exploiting (existing) big data software
๏‚ง Data collection to threat knowledge base
๏‚ง Toward security information pipeline
๏‚ง Enrichment of analytical results
๏‚ง To policy enforcement
๏‚ง Real-time analysis
30
ProtectionData Analysis
Human
Inputs

More Related Content

What's hot

Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
Chris Huang
ย 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
Chris Huang
ย 
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทตApache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
Hao Chen
ย 

What's hot (20)

Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
ย 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data Analytics
ย 
Understanding apache-druid
Understanding apache-druidUnderstanding apache-druid
Understanding apache-druid
ย 
Data Science Crash Course
Data Science Crash CourseData Science Crash Course
Data Science Crash Course
ย 
Matching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software ArchitecturesMatching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software Architectures
ย 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
ย 
Druid Scaling Realtime Analytics
Druid Scaling Realtime AnalyticsDruid Scaling Realtime Analytics
Druid Scaling Realtime Analytics
ย 
Energy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshopEnergy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshop
ย 
Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...
ย 
Deep Learning vs. Cheap Learning
Deep Learning vs. Cheap LearningDeep Learning vs. Cheap Learning
Deep Learning vs. Cheap Learning
ย 
What is the "Big Data" version of the Linpack Benchmark? ; What is โ€œBig Data...
What is the "Big Data" version of the Linpack Benchmark?; What is โ€œBig Data...What is the "Big Data" version of the Linpack Benchmark?; What is โ€œBig Data...
What is the "Big Data" version of the Linpack Benchmark? ; What is โ€œBig Data...
ย 
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex BlackTestistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
ย 
Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...
ย 
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
ย 
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทตApache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
Apache Eagle: eBayๆž„ๅปบๅผ€ๆบๅˆ†ๅธƒๅผๅฎžๆ—ถ้ข„่ญฆๅผ•ๆ“Žๅฎž่ทต
ย 
Apache Eagle Dublin Hadoop Summit 2016
Apache Eagle   Dublin Hadoop Summit 2016Apache Eagle   Dublin Hadoop Summit 2016
Apache Eagle Dublin Hadoop Summit 2016
ย 
Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016
ย 
Cloud Services for Big Data Analytics
Cloud Services for Big Data AnalyticsCloud Services for Big Data Analytics
Cloud Services for Big Data Analytics
ย 
Cloudbreak - Technical Deep Dive
Cloudbreak - Technical Deep DiveCloudbreak - Technical Deep Dive
Cloudbreak - Technical Deep Dive
ย 
Strata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case StudiesStrata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case Studies
ย 

Viewers also liked

Viewers also liked (19)

Hadoop security
Hadoop securityHadoop security
Hadoop security
ย 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview
ย 
"Big Data" in the Energy Industry
"Big Data" in the Energy Industry"Big Data" in the Energy Industry
"Big Data" in the Energy Industry
ย 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and Challenges
ย 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
ย 
Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview
ย 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
ย 
Real time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationReal time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing application
ย 
Hadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache KnoxHadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache Knox
ย 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage Strategy
ย 
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONREAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
ย 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
ย 
Add
AddAdd
Add
ย 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
ย 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data science
ย 
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneOpen-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
ย 
Mr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricMr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electric
ย 
Smart Analytics For The Utility Sector
Smart Analytics For The Utility SectorSmart Analytics For The Utility Sector
Smart Analytics For The Utility Sector
ย 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the Environment
ย 

Similar to MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets

Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
Novetta
ย 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Rod Soto
ย 

Similar to MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets (20)

Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
ย 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
ย 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
ย 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
ย 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
ย 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
ย 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
ย 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
ย 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
ย 
Best practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at RenaultBest practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at Renault
ย 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
ย 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
ย 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
ย 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
ย 
Backtrack
BacktrackBacktrack
Backtrack
ย 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
ย 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
ย 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
ย 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
ย 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
ย 

More from APNIC

More from APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
ย 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
ย 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
ย 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
ย 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
ย 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
ย 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
ย 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
ย 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
ย 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
ย 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
ย 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
ย 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
ย 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
ย 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
ย 

Recently uploaded

valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
SUHANI PANDEY
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
SUHANI PANDEY
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
SUHANI PANDEY
ย 

Recently uploaded (20)

valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 

MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets

  • 1. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu MATATABI : Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets Yuji Sekiya* *The University of Tokyo, Japan
  • 2. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Multi-layer Threat Analysis Victim side action Filtering Load balancing Isolation Countermeasure for Attackers Report to ISP Announce to users Filtering at ISP level Configuration to servers Data collection at Multiple layers/locations Network device Servers Users Device Analysis Platform Analysis 1 Analysis 2 Analysis 3 Threat analysis (detection) across multiple datasources Threat Information Share Among organizations Announce to public 2
  • 3. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Security Information Pipeline ๏‚ง Making pipeline through divert activities ๏‚ง Data collection (Traffic, User behavior, etc) ๏‚ง Threat Analysis ๏‚ง Human decision ๏‚ง Protection (Enforcement) ProtectionData Analysis Human Inputs 3
  • 4. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Datasets 4 MATATABI Switch Router DNS Firewall SPAM Phishing Site External Information sFlow NetFlow URL SPAM Sender URL syslog querylog pcap text URL
  • 5. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Data Volume N*10GByte/day 20TB/10months Traffic sampling Packet dump E-mail DNS Web traffic 5
  • 6. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 1. Forensics : preserving log data ๏‚ง To keep evidences as traceable. ๏‚ง To analyze multi-source data exhaustively 2. Scalability : should be tolerable to huge data ๏‚ง To store a huge amount of datasets ๏‚ง To process datasets in a reasonable time 3. Real-time analysis : processing performance ๏‚ง Possibly real-time analysis of any datasets 4. Uniform programmability : ๏‚ง Various data format should be easily accessible ๏‚ง Various analysis program can be used Goals of MATATABI 6
  • 7. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu NECOMA ECO System Infrastructure Data End Point Data API API Analysis Module / Early Warning System API Threat Information Sharing External Knowledge DB API Crawler API External Resource (web) Infrastructure Devices End Point Devices API API Resilience Mechanism API Get external threat information Get data Put analysis results Get threat information and other results Get threat information Control infrastructure and end point devices Crawling external resource and extracting knowledge Collection Probe Collection Probe Get data Petsas et al., A Trusted Knowledge Management System for Multi-layer Threat Analysis. TRUST 14โ€™ (poster session), June 2014 7
  • 8. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap s๏ฌ‚ow net๏ฌ‚ow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI ๏‚ง 4 components 1) Storage 2) Data import/process module 3) Analysis module 4) Application Programming Interface (API) MATATABI Overview 8
  • 9. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Built by Open-Source Software ๏‚ง Actively using open-sourced software ๏‚ง Apace Hadoop (HDFS, MapReduce, etc) ๏‚ง Apache Hive (SQL-like language => distributed jobs) ๏‚ง Facebook Presto (Distributed SQL engine) ๏‚ง Apache Mahout (Machine learning library) ๏‚ง Apache Thrift (Language bindings) ๏‚ง Hadoop-pcap (pcap file parser) ๏‚ง Fixed issues and packaged by NECOMA ๏‚ง https://github.com/necoma 9
  • 10. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 1) Storage ๏‚ง Storing measured data to Hadoop Distributed FileSystem (HDFS) ๏‚ง Easily scaled-out โ€ข Data access by tools โ€“ Hive/Presto-db โ€“ Hadoop-pcap HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap s๏ฌ‚ow net๏ฌ‚ow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 10
  • 11. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 2) Data import module ๏‚ง Pre-processing measurement data โ€ข By each dataset โ€“ Raw data (e.g., pcap) โ€“ Converting to Hive tables HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap s๏ฌ‚ow net๏ฌ‚ow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 11
  • 12. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 3) (Threat) Analysis module ๏‚ง Easily implement-able ๏‚ง Bunch of analysis ๏‚ง Distributed computations (MapReduce) HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap s๏ฌ‚ow net๏ฌ‚ow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 12
  • 13. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 4) Application Programming Interface (API) ๏‚ง Export analysis results ๏‚ง Export dataset itself (if needed) ๏‚ง Implemented with n6 REST API ๏‚ง JSON/CSV/IODEF format HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap s๏ฌ‚ow net๏ฌ‚ow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 13
  • 14. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Analysis Modules (Use cases) 14 Name Datasets Frequency LoC (#lines) Remark ZeuS DGA detector DNS pcap, netflow daily 25 hadoop-pcap UDP fragmentation detector sflow daily 48 Phishing likelihood calculator Phishing URLs, Phishing content 1-shot โ€“ Mahout (RandomForest) NTP amplifier detector netflow, sflow daily 143 pyhive, Maxmind GeoIP sflow daily 24 DNS amplifier detector sflow, open resolver [19] daily 37 Anomalous heavy-hitter detector netflow, sflow daily 106 pyhive DNS anomaly detection DNS pcap, whois, malicious/legitimate domain list daily 57 hadoop-pcap, Mahout (RandomForest) SSL scan detector sflow 1-shot 36 DNS failure graph analysis DNS pcap daily 159 pyhive
  • 15. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu โ€ข Make a SQL request by Presto โ€ข Get IP addresses that sends UDP traffic on port 123 with a packet size = 468 โ€ข Packet size of Monlist reply = 468 bytes 15 Analysis Example (1) Finding NTP Amplifiers SELECT sa FROM netflow WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 GROUP BY sa
  • 16. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu presto:default> SELECT sa FROM netflow_wide_rcfile WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 AND dt>'20150401' GROUP BY sa; Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits 0:11 [ 457M rows, 9.8GB] [41.3M rows/s, 908MB/s] [======>>>>>> ] 14% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 1.88K 135 33.2K 2.39K 0 8 0 2.....R 457M 32.9M 9.8G 723M 622 94 120 Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits 1:05 [1.63B rows, 37.7GB] [25.2M rows/s, 596MB/s] [===========================>>>>>>>> ] 64% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 16.9K 260 299K 4.61K 0 8 0 2.....R 1.63B 25.1M 37.7G 595M 147 147 542 16 Analysis Example (1) Finding NTP Amplifiers
  • 17. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu sa ----------------- 17 Analysis Example (1) Finding NTP Amplifiers
  • 18. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 18 Analysis Example (2) Detecting DNS Amplifier Attacks Open Resolver DNS Server Attackers Spoofed Packets
  • 19. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu ๏‚ง Found Response with RD(Recursive Desired) flag. ๏‚ง Queries from Open Resolver Servers ๏‚ง Attempts of the Water Torture Attack select src,count(*) from dns_pcaps where dt='20150401' and dns_qr=true and dns_flags like '%rd%' and server=โ€˜dns1-pcapโ€™ group by src; Analysis Example (2) Detecting DNS Amplifier Attacks
  • 20. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 20 Authoritative DNS Servers Resolver DNS Server Attackers Spoofed Answers Analysis Example (3) Detecting DNS Cache Poisoning Attacks Query
  • 21. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Analysis Example (3) Detecting DNS Cache Poisoning Attacks ๏‚ง Normally # of query from resolver server > # of query to resolver server ๏‚ง Counting number of queries from resolver server ๏‚ง Counting number of answers to resolver server ๏‚ง If not, it is possibly ddos or cache poisoning attack against our DNS resolver server select floor(ts/60),count(*) from dns_pcaps where dt = '20150401โ€™ and dns_qr=false and dns_flags not like โ€˜%rd%โ€™ and server=โ€™ns1-pcapโ€˜ group by floor(ts/60); select floor(ts/60),count(*) from dns_pcaps where dt = '20150401โ€™ and dns_qr=true and dns_flags like โ€˜%aa%โ€™ and server=โ€˜ns1-pcapโ€™ group by floor(ts/60);
  • 22. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Detecting Botnet infected hosts by DGA Queries 22 โ€ข Domain Generation Algorithm (DGA) โ€“ Auto generated domain names used by botnets โ€“ Usually the names are changed in a short span โ€“ Difficult to detect botnets hosts by domain name. โ€ข ZeuS-DGA โ€“ [a-z0- 9]{32,48}.(ru|com|biz|info|o rg|net) โ€“ Example๏ผš f528764d624db129b32c21fbc a0cb8d6.com 001: gh3t852dwps7v47v4139eid62g190bjrs 002: g22tdk3q8097o97fcs0j46fe0l7wc56us 003: gj9d611364m0ysceiq0x250fm5u69zq5s : botmaster bot domain list: periodically generate 001: gh3t852dwps7v47v4139eid62g190bjrs 002: g22tdk3q8097o97fcs0j46fe0l7wc56us 003: gj9d611364m0ysceiq0x250fm5u69zq5s : domain list: periodically generate g22tdk3q8097o97fcs0j46fe0l7wc56us.ru 001.ru 001.com 002.ru
  • 23. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu ๏‚ง Found specific regular expression type in queries ๏‚ง Some botnet clients generate dynamic, randomized DNS name to contact botnet C&C servers (so called DGA) select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0-9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt='20150401'; Analysis Example (4) Detecting DGA Queries
  • 24. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu presto:default> select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0- 9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt>'20150401'; Query 20150810_114848_00226_u378i, RUNNING, 11 nodes, 1,435 splits 1:17 [ 123M rows, 4.15GB] [1.61M rows/s, 55.5MB/s] [ <=> ] STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......S 123M 1.61M 4.15G 55.5M 1100 217 117 Query 20150810_115500_00228_u378i, RUNNING, 11 nodes, 143 splits 2:22 [87.4M rows, 4.73GB] [ 615K rows/s, 34.1MB/s] [========================================>>] 93% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 87.4M 615K 4.73G 34.1M 0 9 133 24 Analysis Example (4) Detecting DGA Queries
  • 25. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 2001:XXXX:1d8:0:0:0:0:106 | cg79wo20kl92doowfn01oqpo9mdieowv5tyj. 0 IN A 2001:XXXX:0:1:0:0:0:f | cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com. 0 IN A 157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 23.XXX.104.44 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 23.XXX.111.231 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 173.XXX.59.40 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 192.XXX.79.30 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 185.XXX.155.12 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 173.XXX.58.45 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 25 Analysis Example (4) Detecting DGA Queries
  • 26. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Movie : Zeus-DGA Analysis 26
  • 27. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Visualization of Zeus DGA and Botnet ๏‚ง 2015/07/01 โ€“ 2015/07/05 ๏‚ง The number of the most active DGA query is 23 ๏‚ง Related traffic flows from netflow datasets. 27
  • 28. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Visualization : Zeus-DGA Distribution 28
  • 29. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu One of Protection Methods ๏‚ง SDN IX (PIX-IE) ๏‚ง Programmable IX in Edo : PIX-IE ๏‚ง Mitigating and filtering suspicious flows at IX ๏‚ง IX is a public space in the Internet ๏‚ง Before link saturation, an ISP operator can stop DDoS flows 29 Programmable IX (PIX-IE) ISP ISP ISP ISP ISP ISP Vic m ISP Vic m Service Spoofed SRC UDP Link Satura on The operator has to contact to each ISP, and ask to filter the DDoS packets โ€ฆ Human Interac on Programmable IX (PIX-IE) ISP ISP ISP ISP ISP ISP Vic m ISP Vic m Service Mi ga on Mi ga on Mi ga on Mi ga on REST API
  • 30. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Summary and Ongoing Work ๏‚ง MATATABI: a platform for threat analysis ๏‚ง Exploiting (existing) big data software ๏‚ง Data collection to threat knowledge base ๏‚ง Toward security information pipeline ๏‚ง Enrichment of analytical results ๏‚ง To policy enforcement ๏‚ง Real-time analysis 30 ProtectionData Analysis Human Inputs

Editor's Notes

  1. ใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃๆƒ…ๅ ฑใฎใƒ‘ใ‚คใƒ—ใƒฉใ‚คใƒณๆง‹็ฏ‰
  2. Controlling several pieces of network components (measurements, analysis, endpoints, others actiivties) via Threat Information sharing (NECOMAtter)
  3. netflowใƒ†ใƒผใƒ–ใƒซใ‚นใ‚ญใƒผใƒžใฎ่ชฌๆ˜Ž