SlideShare a Scribd company logo
1 of 18
© 2014 Tier-3 Pty Ltd, All rights reserved 1 Intelligent Security. We deliver it.
Intelligence-based
Computer Network Defence
Piers Wilson
Tier-3 Huntsman® - Head of Product Management
© 2014 Tier-3 Pty Ltd, All rights reserved 2 Intelligent Security. We deliver it.
• Cyber attacks continue to
increase
• Even closed networks are
vulnerable
• Both External and Internal
attacks
• Increasing sophistication
• Every organisation is at risk
Setting the Scene
© 2014 Tier-3 Pty Ltd, All rights reserved 3 Intelligent Security. We deliver it.
The Cyber security “kill chain” concept
Cyber Kill Chain – sequential chain of events for successful attack
© Lockheed Martin
Increasing risk / cost to contain and remediate
Pre-Compromise Post-CompromiseCompromise
© 2014 Tier-3 Pty Ltd, All rights reserved 4 Intelligent Security. We deliver it.
Considering Attack Cycles
• Harvesting email addresses, conference
information, staff bios, Press coverage
Reconnaissance
• Coupling exploit with backdoor into a
deliverable payload
Weaponisation
• Getting the payload to the victim via email,
web drive-by, USB
Delivery
• Exploiting the vulnerability to execute codeExploitation
• Installing the malware/payload on the
system
Installation
• Establishing channel back to the attack
source
Command &
Control
• Undertaking the automatic and attacker-
driven activity desired
Actions on
Objectives
• “Thinking like an attacker”
• The likelihood of being caught & ROI ?
• What's the best way to test the attack method ?
• Enumeration of the organisation
• Identify valuable/vulnerable assets
• Establish how to get the information out
• Acceptance that defences may not be sufficient
and thus detection and diagnosis are key
• Rapid detection means less cost, more chance to mitigate,
better chance of recovery
• Dealing with both external and insider threats
• Need to consider the “indicators of compromise”
at each stage
• Anomalies detected
• Events on boundary egress points
• Critical documents / information silos
• System performance and health
• Activity levels, session lengths, traffic and flow patterns
© 2014 Tier-3 Pty Ltd, All rights reserved 5 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components
© 2014 Tier-3 Pty Ltd, All rights reserved 6 Intelligent Security. We deliver it.
Threat Intelligence
Integration of external
TI feeds for detection
AND analysis purposes
to aid efficient operations
Capture of static or
dynamic internal
information and
intelligence on threats
and risks
Operational incident detection
and analysis process generate
real-time, interpreted Threat
Intelligence
Automation and confidence in
alerting, detection and
escalation processes
© 2014 Tier-3 Pty Ltd, All rights reserved 7 Intelligent Security. We deliver it.
Internal & Contextual
• Import and cross-reference to (internal) state databases
• E.g. users of different types, physical/location status, risk levels, system sensitivities,
even self-created lists of systems that are the subject of incidents and investigations
• Recent use case was a list of users who are “under increased vigilance”
• Integration of vulnerability assessment tools
• Network capture to derive asset information, deduce port usage,
flow statistics in real time
• Provides understanding of likely vulnerability/threat
• Understanding of ongoing incidents and system statuses/risks
• Integrated information from specific security/capture solutions
• Active response to capture real-time alert data
• Camera images
• System configuration, process, network sessions, file system snapshot
Internal
Intelligence
Databases
Contextual
Vulnerability,
Incident and
Asset Data
Internal Security,
Malware and
Attack Context
© 2014 Tier-3 Pty Ltd, All rights reserved 8 Intelligent Security. We deliver it.
• Import of external data for use in detection, correlation and alerting
• Compromised sites, malicious URLs, phishing sources, IP reputations
• Ensure you “know what everyone else knows” – throughout the kill
chain (diagnosis and response)
• Open source and/or commercial feeds
• Mapping from IP address
to world location
• Make decisions
based on risk profiles or
known operational
locations
External Threat Intelligence
External
Geographic
Information
External Threat
Intelligence
Sources
© 2014 Tier-3 Pty Ltd, All rights reserved 9 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components
© 2014 Tier-3 Pty Ltd, All rights reserved 10 Intelligent Security. We deliver it.
Activity to/from risky or strange locations
Personal sensitivities (role, seniority, access)
Patterns of traffic between IP address pairs
Session durations
Data flow volumes and directions
Activity on sensitive internal hosts
Number of files open(ed)
Number of pages or documents printed
Query/search results (numbers)
User account group membership activity
Use of media like USB/CD
Connections to cloud-based storage
Indicators of Compromise
Think how
an Insider
might
behave,
what they
might do,
how they
would steal
data
What might
be the early
signs of an
external
attack or
Trojan, APT,
spear
phishing
activity
© 2014 Tier-3 Pty Ltd, All rights reserved 11 Intelligent Security. We deliver it.
Monitor / learn behavioural profile
automatically to create a dynamic
baseline of system behaviour
Continuously updated as the
environment changes
Correlating with other events,
detections for any deviations from
the “normal” baseline to alert
operators
Detecting Anomalous Behaviour
Hard in complex systems for analysts:
To know the network
To estimate thresholds
Have to constantly re-write rules
Make safe/reliable assumptions
Attack nature can be more easily
predictable
Start from the Indicator of Compromise
– or IoC - for APTs, zero-day & insider
threats
Indicators and behaviours play a role at
different stages of the kill chain
© 2014 Tier-3 Pty Ltd, All rights reserved 12 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components
© 2014 Tier-3 Pty Ltd, All rights reserved 13 Intelligent Security. We deliver it.
Automating Responses
Manual analysis and
triage
Automatic response
(can be risky)
Suspicion / Detection
Automatic
information/context
gathering
Making changes, turning things off,
closing sessions can help, but may
impact normal business
System, user, process, network
information is transient – needs to be
gathered at the time (later is no use)
Manual response
Making sense of the data to
understand the incident and effect
appropriate
containment/investigation/remediatio
n
© 2014 Tier-3 Pty Ltd, All rights reserved 14 Intelligent Security. We deliver it.
Process efficiency:
Automating as much as possible and streamlining everything else
More than just purely “actively responding”
closing sessions, disrupting attacker, disabling user accounts...
Key use case:
Gather data/context “at the time of an alert” ...
Webcam photo, screen shot
System configuration, running processes, network sessions
... and from “just before”
i.e. caching a rolling data set (e.g. network traffic) and freezing it when an alert occurs
Note:
Only really works with real-time analysis and detection systems
You have a way to work with the dataset that is collected
Automatic Response
© 2014 Tier-3 Pty Ltd, All rights reserved 15 Intelligent Security. We deliver it.
To close ...
© 2014 Tier-3 Pty Ltd, All rights reserved 16 Intelligent Security. We deliver it.
Remember the “kill chain” concept
Cyber Kill Chain – sequential chain of events for successful attack
© Lockheed Martin
Monitor, detect and respond throughout attack lifecycle
Pre-Compromise Post-CompromiseCompromise
© 2014 Tier-3 Pty Ltd, All rights reserved 17 Intelligent Security. We deliver it.
What will “good” look like?
More
Confident/Reliable
Detection
• Given that “something” has been
detected have to decide if it is
significant (with confidence)
• “Potential incident” investigated based
on the surrounding or associated
contextual data
• Maximise use of established data
sources and automation:
• Swifter “confirmed detection”
• Fewer false positives/negatives
• Single view of information across sources
• Throughout the kill chain, and as early
as possible
Earlier Understanding
/Faster Analysis
• Anticipate obvious questions for triage,
analysis, escalation process
• Predictable requests dealt with automatically
• Pre-emptive information gathering
• Leverage data available from at / before
the time of incident:
• Screen shots, systems’ configurations, file
contents, network sessions, open files ...
• Focus staff concentration on decision
making rather than manual information
gathering
© 2014 Tier-3 Pty Ltd, All rights reserved 18 Intelligent Security. We deliver it.
Thank you
Piers Wilson
piers.wilson@tier-3.com +44 (0) 7800 508517
info@tier-3.com
+44 (0) 118 900 1550
www.tier-3.com twitter.com/Tier3huntsman

More Related Content

What's hot

Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 

What's hot (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 

Viewers also liked

Understanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial IntelligenceUnderstanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial Intelligence
Mark Farrell
 
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
MRS
 
Interpersonal intelligence
Interpersonal intelligenceInterpersonal intelligence
Interpersonal intelligence
Maricel Pinzon
 

Viewers also liked (20)

Towards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligenceTowards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligence
 
Understanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales ProfessionalsUnderstanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales Professionals
 
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby FetzerUnderstanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
 
Understanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial IntelligenceUnderstanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial Intelligence
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
 
Understanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop CultureUnderstanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop Culture
 
Understanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI DemoUnderstanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI Demo
 
Social intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your businessSocial intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your business
 
Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1
 
Understanding Artificial intelligence
Understanding Artificial intelligenceUnderstanding Artificial intelligence
Understanding Artificial intelligence
 
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
 
Mobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customersMobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customers
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
 
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
 
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
 
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
 
Interpersonal intelligence
Interpersonal intelligenceInterpersonal intelligence
Interpersonal intelligence
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
 
Edomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみようEdomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみよう
 
Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...
 

Similar to Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference)

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference) (20)

Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Mis
MisMis
Mis
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Unit v
Unit vUnit v
Unit v
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from Huntsman Security

More from Huntsman Security (7)

Infosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction SecurityInfosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction Security
 
Infosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security responseInfosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security response
 
Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference)

  • 1. © 2014 Tier-3 Pty Ltd, All rights reserved 1 Intelligent Security. We deliver it. Intelligence-based Computer Network Defence Piers Wilson Tier-3 Huntsman® - Head of Product Management
  • 2. © 2014 Tier-3 Pty Ltd, All rights reserved 2 Intelligent Security. We deliver it. • Cyber attacks continue to increase • Even closed networks are vulnerable • Both External and Internal attacks • Increasing sophistication • Every organisation is at risk Setting the Scene
  • 3. © 2014 Tier-3 Pty Ltd, All rights reserved 3 Intelligent Security. We deliver it. The Cyber security “kill chain” concept Cyber Kill Chain – sequential chain of events for successful attack © Lockheed Martin Increasing risk / cost to contain and remediate Pre-Compromise Post-CompromiseCompromise
  • 4. © 2014 Tier-3 Pty Ltd, All rights reserved 4 Intelligent Security. We deliver it. Considering Attack Cycles • Harvesting email addresses, conference information, staff bios, Press coverage Reconnaissance • Coupling exploit with backdoor into a deliverable payload Weaponisation • Getting the payload to the victim via email, web drive-by, USB Delivery • Exploiting the vulnerability to execute codeExploitation • Installing the malware/payload on the system Installation • Establishing channel back to the attack source Command & Control • Undertaking the automatic and attacker- driven activity desired Actions on Objectives • “Thinking like an attacker” • The likelihood of being caught & ROI ? • What's the best way to test the attack method ? • Enumeration of the organisation • Identify valuable/vulnerable assets • Establish how to get the information out • Acceptance that defences may not be sufficient and thus detection and diagnosis are key • Rapid detection means less cost, more chance to mitigate, better chance of recovery • Dealing with both external and insider threats • Need to consider the “indicators of compromise” at each stage • Anomalies detected • Events on boundary egress points • Critical documents / information silos • System performance and health • Activity levels, session lengths, traffic and flow patterns
  • 5. © 2014 Tier-3 Pty Ltd, All rights reserved 5 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 6. © 2014 Tier-3 Pty Ltd, All rights reserved 6 Intelligent Security. We deliver it. Threat Intelligence Integration of external TI feeds for detection AND analysis purposes to aid efficient operations Capture of static or dynamic internal information and intelligence on threats and risks Operational incident detection and analysis process generate real-time, interpreted Threat Intelligence Automation and confidence in alerting, detection and escalation processes
  • 7. © 2014 Tier-3 Pty Ltd, All rights reserved 7 Intelligent Security. We deliver it. Internal & Contextual • Import and cross-reference to (internal) state databases • E.g. users of different types, physical/location status, risk levels, system sensitivities, even self-created lists of systems that are the subject of incidents and investigations • Recent use case was a list of users who are “under increased vigilance” • Integration of vulnerability assessment tools • Network capture to derive asset information, deduce port usage, flow statistics in real time • Provides understanding of likely vulnerability/threat • Understanding of ongoing incidents and system statuses/risks • Integrated information from specific security/capture solutions • Active response to capture real-time alert data • Camera images • System configuration, process, network sessions, file system snapshot Internal Intelligence Databases Contextual Vulnerability, Incident and Asset Data Internal Security, Malware and Attack Context
  • 8. © 2014 Tier-3 Pty Ltd, All rights reserved 8 Intelligent Security. We deliver it. • Import of external data for use in detection, correlation and alerting • Compromised sites, malicious URLs, phishing sources, IP reputations • Ensure you “know what everyone else knows” – throughout the kill chain (diagnosis and response) • Open source and/or commercial feeds • Mapping from IP address to world location • Make decisions based on risk profiles or known operational locations External Threat Intelligence External Geographic Information External Threat Intelligence Sources
  • 9. © 2014 Tier-3 Pty Ltd, All rights reserved 9 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 10. © 2014 Tier-3 Pty Ltd, All rights reserved 10 Intelligent Security. We deliver it. Activity to/from risky or strange locations Personal sensitivities (role, seniority, access) Patterns of traffic between IP address pairs Session durations Data flow volumes and directions Activity on sensitive internal hosts Number of files open(ed) Number of pages or documents printed Query/search results (numbers) User account group membership activity Use of media like USB/CD Connections to cloud-based storage Indicators of Compromise Think how an Insider might behave, what they might do, how they would steal data What might be the early signs of an external attack or Trojan, APT, spear phishing activity
  • 11. © 2014 Tier-3 Pty Ltd, All rights reserved 11 Intelligent Security. We deliver it. Monitor / learn behavioural profile automatically to create a dynamic baseline of system behaviour Continuously updated as the environment changes Correlating with other events, detections for any deviations from the “normal” baseline to alert operators Detecting Anomalous Behaviour Hard in complex systems for analysts: To know the network To estimate thresholds Have to constantly re-write rules Make safe/reliable assumptions Attack nature can be more easily predictable Start from the Indicator of Compromise – or IoC - for APTs, zero-day & insider threats Indicators and behaviours play a role at different stages of the kill chain
  • 12. © 2014 Tier-3 Pty Ltd, All rights reserved 12 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 13. © 2014 Tier-3 Pty Ltd, All rights reserved 13 Intelligent Security. We deliver it. Automating Responses Manual analysis and triage Automatic response (can be risky) Suspicion / Detection Automatic information/context gathering Making changes, turning things off, closing sessions can help, but may impact normal business System, user, process, network information is transient – needs to be gathered at the time (later is no use) Manual response Making sense of the data to understand the incident and effect appropriate containment/investigation/remediatio n
  • 14. © 2014 Tier-3 Pty Ltd, All rights reserved 14 Intelligent Security. We deliver it. Process efficiency: Automating as much as possible and streamlining everything else More than just purely “actively responding” closing sessions, disrupting attacker, disabling user accounts... Key use case: Gather data/context “at the time of an alert” ... Webcam photo, screen shot System configuration, running processes, network sessions ... and from “just before” i.e. caching a rolling data set (e.g. network traffic) and freezing it when an alert occurs Note: Only really works with real-time analysis and detection systems You have a way to work with the dataset that is collected Automatic Response
  • 15. © 2014 Tier-3 Pty Ltd, All rights reserved 15 Intelligent Security. We deliver it. To close ...
  • 16. © 2014 Tier-3 Pty Ltd, All rights reserved 16 Intelligent Security. We deliver it. Remember the “kill chain” concept Cyber Kill Chain – sequential chain of events for successful attack © Lockheed Martin Monitor, detect and respond throughout attack lifecycle Pre-Compromise Post-CompromiseCompromise
  • 17. © 2014 Tier-3 Pty Ltd, All rights reserved 17 Intelligent Security. We deliver it. What will “good” look like? More Confident/Reliable Detection • Given that “something” has been detected have to decide if it is significant (with confidence) • “Potential incident” investigated based on the surrounding or associated contextual data • Maximise use of established data sources and automation: • Swifter “confirmed detection” • Fewer false positives/negatives • Single view of information across sources • Throughout the kill chain, and as early as possible Earlier Understanding /Faster Analysis • Anticipate obvious questions for triage, analysis, escalation process • Predictable requests dealt with automatically • Pre-emptive information gathering • Leverage data available from at / before the time of incident: • Screen shots, systems’ configurations, file contents, network sessions, open files ... • Focus staff concentration on decision making rather than manual information gathering
  • 18. © 2014 Tier-3 Pty Ltd, All rights reserved 18 Intelligent Security. We deliver it. Thank you Piers Wilson piers.wilson@tier-3.com +44 (0) 7800 508517 info@tier-3.com +44 (0) 118 900 1550 www.tier-3.com twitter.com/Tier3huntsman

Editor's Notes

  1. Foot printing Art of Gathering information Profile your intranet/extranet Determining your security posture Critical to foot printing are:- Network Domain Your Website IP Ranges Blocks Access Controls IDS SCANNING:- Ping and Port Sweeps Enumeration Probing your Network