SlideShare a Scribd company logo
1 of 33
Download to read offline
OWASP Poland Day
16.10.2019, Wrocław University of Science and Technology
Advanced Data Analysis
in RegSOC project
16.10.2019
OWASP Poland Day, Wrocław
2
Plan
16.10.2019
OWASP Poland Day, Wrocław
Short procject introductionI
Anomaly detectionII
Advanced analysis of text
data
III
16.10.2019
OWASP Poland Day, Wrocław
I. Short RegSOC project introduction
Speakers:
Agnieszka Kwiecień
Jacek Oko
16.10.2019
OWASP Poland Day, Wrocław
4
Project facts
Title: Regional Center for Cybersecurity (RegSOC)
Program: National program: CyberSecIdent - Cybersecurity and e-Identity, II Call
Co-financing agency: National Centre for Research and Development
Project duration: 01.03.2018 – 28.02.2021
Consortium: Wroclaw University of Science and Technology (WCSS) - The Leader
National Research Institute NASK
Łukasiewicz Research Network - Instytut of Innovative Technologies EMAG
Supporting entities: Gmina Złotoryja (urban, rural)
Rejonowe Przedsiębiorstwo Komunalne Spółka z o.o. in Złotoryja
The Municipal Council in Lądek-Zdrój
Association for the development of the information society „e-South”
Silesian ICT Cluster
DSS Operator SA
16.10.2019
OWASP Poland Day, Wrocław
5
Gap identification
 Independent reports indicate a significant number of
incidents in the public sphere compared to other
branches of the economy.
 Directions of changes in cybersecurity at the
European, national and sectoral level are being set
and implemented (NIS Directive, GDPR,
Cybersecurity Strategy for Poland, The National
Cybersecurity System)
Source:
2017 Data Breach Investigations Report, Verizon
16.10.2019
OWASP Poland Day, Wrocław
Gap identification
6
The most common problems related to ensuring
information security
Source: Supreme Audit Office Report, 2018
 The amount of digital public data is growing
(educational, tax, spatial, geodetic, construction,
drivers and vehicles, population register, social
welfare, ...).
 NIK raport (2016-2018) assesses the security of
electronic information resources as low in local
government units in the one of the Polish
Voivodeships.
 There remains a significant gap at the local level
in terms of:
• regulations,
• funding,
• available competences.
16.10.2019
OWASP Poland Day, Wrocław
7
Project goals
The goal of RegSOC Project is to prepare and initiate a prototype instance of the
model Regional Center for Cybersecurity (RegSOC) for public entities in Poland,
with ability of extending the cooperation to private sector.
In cooperation with national cybersecurity center – CSIRT NASK, the RegSOC
Centers may constitute an element of the multilevel system for cybersecurity of
Republic of Poland.
16.10.2019
OWASP Poland Day, Wrocław
8
Expected results
Hardware&Software appliance for public entities, able to operate as standalone
autonomous device within local administration domain, as well as integrated with RegSOC;
The cybersecurity monitoring platform for needs of the RegSOC ecosystem. The platform
will be the software and organizational solution (management models and organizational
procedures);
The procedural and organizational model of operation of the regional centers in
cooperation with national level CSIRT NASK, along with the internal software integrating
RegSOC with National Cybersecurity Platform (NPC);
The model RegSOC instance initiated at the University, with client components deployed at
the selected entities interested in the project’s results;
The project final report pointing out the technical and economic possibilities of broad
deployment on Polish cybersecurity ecosystem and markets.
16.10.2019
OWASP Poland Day, Wrocław
9
RegSOC ecosystem
Regional level (RegSOC) Central level
Monitoring platform
Analytical Center
CSRIT:
academic
CSRIT:
administration
SOC:
administration
SOC:
academic
data, information
CSIRT
NASK
Information
exchange platform
automaticdata
data, information
CSRIT:
sectoral /non-public
SOC:
business
SOC:
other ... National Cybersecurity
Platform
Target groups
Local goverment
units
Goverment
administration
Business (SME)
Academic entities
16.10.2019
OWASP Poland Day, Wrocław
10
Research areas
Detection of IT system security threats using anomaly detection methods,
Detection of security breaches based on analysis of text data from additional
sources,
Tracking ongoing and identifying new spam campaigns.
16.10.2019
OWASP Poland Day, Wrocław
11
II. Anomaly Detection
Speaker:
Arkadiusz Warzyński
16.10.2019
OWASP Poland Day, Wrocław
12
Introduction
 Anomaly is the behaviour, feature or state of object which is much different from
values which can be observed in the past.
OR
 Anomaly is a pattern in the data that does not conform to the expected behaviour.
 In order to make it possible, each protected system should have a profile of its
normal functioning, which describes the possible states and relationships between
the elements of the system at the moment when we consider it to be secure.
16.10.2019
OWASP Poland Day, Wrocław
13
Real example
 Network intrusion detection,
 Credit card fraud,
 Industrial damage detection,
 Medical diagnostics,
 Video surveillance.
16.10.2019
OWASP Poland Day, Wrocław
14
Intrusion detection
 The growing amount of data transmitted in the network and the emergence of
complex attack methods makes it difficult to prepare and maintain a database of
rules for traditional signature-based intrusion detection systems.
 In this context, anomaly detection should be an important part of
a comprehensive cyber security protection system.
 More and more "big players" in the SOC market are introducing anomaly
detection units in their centers.
16.10.2019
OWASP Poland Day, Wrocław
15
Anomaly detection for intrusion detection
 Major benefits:
• Detection of attacks for which signatures are difficult to create,
• Detection of unknown attacks,
• Detection of distributed/coordinated attacks.
 Major limitations:
• Potential high false positive alarm rate,
• Constantly changing environment -> normal behaviour profile.
16.10.2019
OWASP Poland Day, Wrocław
16
Key challenges
 Normal behaviour keeps evolving,
 The difference between an anomaly and normal behaviour is difficult to define,
 Availability of labeled data,
 Anomalies in different application domains cannot be described in the same way.
16.10.2019
OWASP Poland Day, Wrocław
17
RegSOC approach
16.10.2019
OWASP Poland Day, Wrocław
18
RegSOC approach
 Data sources:
• TCP/IP headers,
• NetFlow data,
• Syslog data.
16.10.2019
OWASP Poland Day, Wrocław
19
RegSOC approach
 Algorithms selected for testing in the first stage of research on the anomaly
detection module:
• ABOD, algorithm analyzing the density of occurrences;
• kNN, clust;
• Ering algorithm;
• OCSVM, a method using a support vector machine to define a normal network traffic
model;
• Multi-layer neural network.
16.10.2019
OWASP Poland Day, Wrocław
20
Recent progress
 ABOD, kNN, OCSVM algorithms have been tested on datasets containing data
from TCP/IP and NetFlow protocol:
• High attacks detection rate,
• Low response time -> possibility to analyze large amounts of data after learning the
model,
• Still a relatively large number of false alarms.
16.10.2019
OWASP Poland Day, Wrocław
21
III. Advanced analysis of text data
Speaker:
Piotr Stróż
16.10.2019
OWASP Poland Day, Wrocław
Flaw flow
Prevention:
Monitoring
internet
Defence:
Anomaly
detection
Curation:
Abuse emails
Twitter – tweets
News portals
Darknet
Facebook – public groups
 Occurring content:
• Requests for cracking social media accounts (Facebook, Gmail), or a device password
(smartphone, laptop, server, router wifi).
• Invitation for hacking courses – links to Facebooks or external events.
• Refference to YouTube materials describing discovered loophole, tutorials, video
courses.
• Questions how to improve security of server, service, etc.
16.10.2019
OWASP Poland Day, Wrocław
28
Gathering +
Filtering
• API search queries
• Trusted cybersecurity information
portals
Categorizing
• 90% Accuracy
• SYSTEM_FLAW
Extracting
• Software/Company Attacked
• Malicious Software/Group
Presenting
to admin
16.10.2019
OWASP Poland Day, Wrocław
29
Abuse emails
Channel for reporting abusive
traffic that originate from our
organization:
 Spam,
 Malicious requests from servers,
 Illegal file sharing.
Anyone can report an incydent.
Extract:
 IP,
 Type of attack,
 Date,
 Additional info, e.g. attacked IP.
16.10.2019
OWASP Poland Day, Wrocław
31
30%
30%
25%
15%
copyright claims
malicious
requests
spam
other
16.10.2019
OWASP Poland Day, Wrocław
32
Project summary – further work
Architecture and software stack, interfaces to other platforms;
Improving and optimization of research prototypes;
Usage scenarios for target groups and testing plan for near-real environment;
Services, use cases and implementation plan.
Nr
etapu
Typ
prac
# mies.
2018 2019 2020 2021
3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
A1 BP 14
A2 BP 16
A3 BP 10
A4 BP 19
A5 PR 19
A6 PR 15
B1 PW 12
Thank you for your attention
Thank you
Project contact:
Agnieszka Kwiecień
agnieszka.kwiecien@pwr.edu.pl
kontakt@wcss.pl
+48 71 320 2456

More Related Content

What's hot

Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnottsJohn Staveley
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security TrendsPriyanka Aash
 
Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Mike Tetreault
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetPrathan Phongthiproek
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesDr. Rajesh P Barnwal
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsphanleson
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)DNIF
 
A tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programA tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programidsecconf
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsBlack Duck by Synopsys
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesBlack Duck by Synopsys
 
DON'T Use Two-Factor Authentication...Unless You Need It!
DON'T Use Two-Factor Authentication...Unless You Need It!DON'T Use Two-Factor Authentication...Unless You Need It!
DON'T Use Two-Factor Authentication...Unless You Need It!Priyanka Aash
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityBlack Duck by Synopsys
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsNowSecure
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...NowSecure
 

What's hot (20)

Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
 
Building the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAseBuilding the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAse
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)
 
A tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programA tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting program
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
DON'T Use Two-Factor Authentication...Unless You Need It!
DON'T Use Two-Factor Authentication...Unless You Need It!DON'T Use Two-Factor Authentication...Unless You Need It!
DON'T Use Two-Factor Authentication...Unless You Need It!
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 

Similar to [OPD 2019] Advanced Data Analysis in RegSOC

Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...IJECEIAES
 
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...IJECEIAES
 
Applied research center for computer networks
Applied research center for computer networksApplied research center for computer networks
Applied research center for computer networksARCCN
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networksijtsrd
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Mikolaj Leszczuk
 
Progress of the Helix Nebula Science Cloud PCP Project
Progress of the Helix Nebula Science Cloud PCP ProjectProgress of the Helix Nebula Science Cloud PCP Project
Progress of the Helix Nebula Science Cloud PCP ProjectHelix Nebula The Science Cloud
 
Arccn Report for Skolkovo Science Board
Arccn Report for Skolkovo Science BoardArccn Report for Skolkovo Science Board
Arccn Report for Skolkovo Science BoardARCCN
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Internet of things notes in simple wording
Internet of things notes in simple wordingInternet of things notes in simple wording
Internet of things notes in simple wordingsk10000067
 
HLG Big Data project and Sandbox
HLG Big Data project and SandboxHLG Big Data project and Sandbox
HLG Big Data project and SandboxCarlo Vaccari
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 

Similar to [OPD 2019] Advanced Data Analysis in RegSOC (20)

Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
EOSC-synergy
EOSC-synergyEOSC-synergy
EOSC-synergy
 
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
 
Applied research center for computer networks
Applied research center for computer networksApplied research center for computer networks
Applied research center for computer networks
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
 
Progress of the Helix Nebula Science Cloud PCP Project
Progress of the Helix Nebula Science Cloud PCP ProjectProgress of the Helix Nebula Science Cloud PCP Project
Progress of the Helix Nebula Science Cloud PCP Project
 
Arccn Report for Skolkovo Science Board
Arccn Report for Skolkovo Science BoardArccn Report for Skolkovo Science Board
Arccn Report for Skolkovo Science Board
 
One year report
One year reportOne year report
One year report
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Plag detection
Plag detectionPlag detection
Plag detection
 
Internet of things notes in simple wording
Internet of things notes in simple wordingInternet of things notes in simple wording
Internet of things notes in simple wording
 
notes-IoT.pdf
notes-IoT.pdfnotes-IoT.pdf
notes-IoT.pdf
 
HLG Big Data project and Sandbox
HLG Big Data project and SandboxHLG Big Data project and Sandbox
HLG Big Data project and Sandbox
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 

More from OWASP

[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dAppsOWASP
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentestOWASP
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020OWASP
 
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architectureOWASP
 
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS InfrastructureOWASP
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and DefensesOWASP
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...OWASP
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilitiesOWASP
 
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computingOWASP
 
[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokensOWASP
 
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzingOWASP
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSSOWASP
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera SoftwareOWASP
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security WorldOWASP
 
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP
 
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP
 
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologiesOWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologiesOWASP
 
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Dani Ramirez - IPMI hackingOWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Dani Ramirez - IPMI hackingOWASP
 
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...OWASP
 

More from OWASP (20)

[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentest
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020
 
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture
 
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing
 
[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens
 
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
 
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
 
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologiesOWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
 
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Dani Ramirez - IPMI hackingOWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
 
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
 

Recently uploaded

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Recently uploaded (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

[OPD 2019] Advanced Data Analysis in RegSOC

  • 1. OWASP Poland Day 16.10.2019, Wrocław University of Science and Technology Advanced Data Analysis in RegSOC project
  • 2. 16.10.2019 OWASP Poland Day, Wrocław 2 Plan 16.10.2019 OWASP Poland Day, Wrocław Short procject introductionI Anomaly detectionII Advanced analysis of text data III
  • 3. 16.10.2019 OWASP Poland Day, Wrocław I. Short RegSOC project introduction Speakers: Agnieszka Kwiecień Jacek Oko
  • 4. 16.10.2019 OWASP Poland Day, Wrocław 4 Project facts Title: Regional Center for Cybersecurity (RegSOC) Program: National program: CyberSecIdent - Cybersecurity and e-Identity, II Call Co-financing agency: National Centre for Research and Development Project duration: 01.03.2018 – 28.02.2021 Consortium: Wroclaw University of Science and Technology (WCSS) - The Leader National Research Institute NASK Łukasiewicz Research Network - Instytut of Innovative Technologies EMAG Supporting entities: Gmina Złotoryja (urban, rural) Rejonowe Przedsiębiorstwo Komunalne Spółka z o.o. in Złotoryja The Municipal Council in Lądek-Zdrój Association for the development of the information society „e-South” Silesian ICT Cluster DSS Operator SA
  • 5. 16.10.2019 OWASP Poland Day, Wrocław 5 Gap identification  Independent reports indicate a significant number of incidents in the public sphere compared to other branches of the economy.  Directions of changes in cybersecurity at the European, national and sectoral level are being set and implemented (NIS Directive, GDPR, Cybersecurity Strategy for Poland, The National Cybersecurity System) Source: 2017 Data Breach Investigations Report, Verizon
  • 6. 16.10.2019 OWASP Poland Day, Wrocław Gap identification 6 The most common problems related to ensuring information security Source: Supreme Audit Office Report, 2018  The amount of digital public data is growing (educational, tax, spatial, geodetic, construction, drivers and vehicles, population register, social welfare, ...).  NIK raport (2016-2018) assesses the security of electronic information resources as low in local government units in the one of the Polish Voivodeships.  There remains a significant gap at the local level in terms of: • regulations, • funding, • available competences.
  • 7. 16.10.2019 OWASP Poland Day, Wrocław 7 Project goals The goal of RegSOC Project is to prepare and initiate a prototype instance of the model Regional Center for Cybersecurity (RegSOC) for public entities in Poland, with ability of extending the cooperation to private sector. In cooperation with national cybersecurity center – CSIRT NASK, the RegSOC Centers may constitute an element of the multilevel system for cybersecurity of Republic of Poland.
  • 8. 16.10.2019 OWASP Poland Day, Wrocław 8 Expected results Hardware&Software appliance for public entities, able to operate as standalone autonomous device within local administration domain, as well as integrated with RegSOC; The cybersecurity monitoring platform for needs of the RegSOC ecosystem. The platform will be the software and organizational solution (management models and organizational procedures); The procedural and organizational model of operation of the regional centers in cooperation with national level CSIRT NASK, along with the internal software integrating RegSOC with National Cybersecurity Platform (NPC); The model RegSOC instance initiated at the University, with client components deployed at the selected entities interested in the project’s results; The project final report pointing out the technical and economic possibilities of broad deployment on Polish cybersecurity ecosystem and markets.
  • 9. 16.10.2019 OWASP Poland Day, Wrocław 9 RegSOC ecosystem Regional level (RegSOC) Central level Monitoring platform Analytical Center CSRIT: academic CSRIT: administration SOC: administration SOC: academic data, information CSIRT NASK Information exchange platform automaticdata data, information CSRIT: sectoral /non-public SOC: business SOC: other ... National Cybersecurity Platform Target groups Local goverment units Goverment administration Business (SME) Academic entities
  • 10. 16.10.2019 OWASP Poland Day, Wrocław 10 Research areas Detection of IT system security threats using anomaly detection methods, Detection of security breaches based on analysis of text data from additional sources, Tracking ongoing and identifying new spam campaigns.
  • 11. 16.10.2019 OWASP Poland Day, Wrocław 11 II. Anomaly Detection Speaker: Arkadiusz Warzyński
  • 12. 16.10.2019 OWASP Poland Day, Wrocław 12 Introduction  Anomaly is the behaviour, feature or state of object which is much different from values which can be observed in the past. OR  Anomaly is a pattern in the data that does not conform to the expected behaviour.  In order to make it possible, each protected system should have a profile of its normal functioning, which describes the possible states and relationships between the elements of the system at the moment when we consider it to be secure.
  • 13. 16.10.2019 OWASP Poland Day, Wrocław 13 Real example  Network intrusion detection,  Credit card fraud,  Industrial damage detection,  Medical diagnostics,  Video surveillance.
  • 14. 16.10.2019 OWASP Poland Day, Wrocław 14 Intrusion detection  The growing amount of data transmitted in the network and the emergence of complex attack methods makes it difficult to prepare and maintain a database of rules for traditional signature-based intrusion detection systems.  In this context, anomaly detection should be an important part of a comprehensive cyber security protection system.  More and more "big players" in the SOC market are introducing anomaly detection units in their centers.
  • 15. 16.10.2019 OWASP Poland Day, Wrocław 15 Anomaly detection for intrusion detection  Major benefits: • Detection of attacks for which signatures are difficult to create, • Detection of unknown attacks, • Detection of distributed/coordinated attacks.  Major limitations: • Potential high false positive alarm rate, • Constantly changing environment -> normal behaviour profile.
  • 16. 16.10.2019 OWASP Poland Day, Wrocław 16 Key challenges  Normal behaviour keeps evolving,  The difference between an anomaly and normal behaviour is difficult to define,  Availability of labeled data,  Anomalies in different application domains cannot be described in the same way.
  • 17. 16.10.2019 OWASP Poland Day, Wrocław 17 RegSOC approach
  • 18. 16.10.2019 OWASP Poland Day, Wrocław 18 RegSOC approach  Data sources: • TCP/IP headers, • NetFlow data, • Syslog data.
  • 19. 16.10.2019 OWASP Poland Day, Wrocław 19 RegSOC approach  Algorithms selected for testing in the first stage of research on the anomaly detection module: • ABOD, algorithm analyzing the density of occurrences; • kNN, clust; • Ering algorithm; • OCSVM, a method using a support vector machine to define a normal network traffic model; • Multi-layer neural network.
  • 20. 16.10.2019 OWASP Poland Day, Wrocław 20 Recent progress  ABOD, kNN, OCSVM algorithms have been tested on datasets containing data from TCP/IP and NetFlow protocol: • High attacks detection rate, • Low response time -> possibility to analyze large amounts of data after learning the model, • Still a relatively large number of false alarms.
  • 21. 16.10.2019 OWASP Poland Day, Wrocław 21 III. Advanced analysis of text data Speaker: Piotr Stróż 16.10.2019 OWASP Poland Day, Wrocław
  • 26. Facebook – public groups  Occurring content: • Requests for cracking social media accounts (Facebook, Gmail), or a device password (smartphone, laptop, server, router wifi). • Invitation for hacking courses – links to Facebooks or external events. • Refference to YouTube materials describing discovered loophole, tutorials, video courses. • Questions how to improve security of server, service, etc.
  • 27.
  • 28. 16.10.2019 OWASP Poland Day, Wrocław 28 Gathering + Filtering • API search queries • Trusted cybersecurity information portals Categorizing • 90% Accuracy • SYSTEM_FLAW Extracting • Software/Company Attacked • Malicious Software/Group Presenting to admin
  • 30. Abuse emails Channel for reporting abusive traffic that originate from our organization:  Spam,  Malicious requests from servers,  Illegal file sharing. Anyone can report an incydent. Extract:  IP,  Type of attack,  Date,  Additional info, e.g. attacked IP.
  • 31. 16.10.2019 OWASP Poland Day, Wrocław 31 30% 30% 25% 15% copyright claims malicious requests spam other
  • 32. 16.10.2019 OWASP Poland Day, Wrocław 32 Project summary – further work Architecture and software stack, interfaces to other platforms; Improving and optimization of research prototypes; Usage scenarios for target groups and testing plan for near-real environment; Services, use cases and implementation plan. Nr etapu Typ prac # mies. 2018 2019 2020 2021 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 A1 BP 14 A2 BP 16 A3 BP 10 A4 BP 19 A5 PR 19 A6 PR 15 B1 PW 12
  • 33. Thank you for your attention Thank you Project contact: Agnieszka Kwiecień agnieszka.kwiecien@pwr.edu.pl kontakt@wcss.pl +48 71 320 2456