SlideShare a Scribd company logo
1 of 37
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Indicator learning based on cyber threat
intelligence and its application Overview
〜 Searching treasures from a vast amount of threat
information 〜
0
CODE BLUE Day0 - Special Track
Counter Cyber Crime Track
(November 8, 2017)
FUJITSU SYSTEM INTEGRATION LABORATORIES LTD.
Tsuyoshi TANIGUCHI
Treasures buried in a vast amount of threat
information
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED1
Cyber Threat Intelligence
Cyber Threat Intelligence: CTI
A report that is created to share
knowledge on a particular thread
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED2
The traditional CTI: Shared by text
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
For a cyberattack called ○○, the involvement
of an attacker named △△ is strongly
suspected. As the method of attack, malware
called □□ connecting to C&C server with IP
xx.xx.xx.xx has been observed.
3
Next CTI: Readable by machines
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
<tag threat-name> ○○ </threat-name>
<tag attacker> △△ </attacker>
<tag attack-method> □□ </attack-method>
<tag ip> xx.xx.xx.xx </ip>
4
STIX (Structured Threat Information eXpression) Format
 One of the CIT
standards
 Consist of 8
information
groups
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
IPA's outline of STIX https://www.ipa.go.jp/security/vuln/STIX.html
5
Intent of Cyber attack
activities
Indicators to detect
attacks
Events observed by
attacks
Behaviors and methods
of cyber attackers Incidents
People/organizations
involved to cyber attacks
Vulnerabilities of targeted software,
systems, and configurations
Countermeasures against
threats
Issues to work on
Analysts have too much CTIs to
analysis
Encourage to share CIT using AIS
(Automated Indicator Sharing)
A vast amount of CTI could turn into
garbage
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED6
Motivation
To help analysts,
find special CTIs (treasures) that
describe attackers
from a vast amount of CTIs
(garbage)
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED7
Image of searching treasures from CTIs
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Real-time type
CTI sources Others
Analysis type
CTI sources
CTI platform
Treasures
(Special CTIs)
8
Indicators
 Indicators to detect attacks with elements of CTIs
 Type of indicators
 IP address ←Target
 Domain ←Target
 Host
 E-mail
 URL
 Hash: MD5, SHA1, SHA256, PEHASH, IMPHASH
 …
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
• IP xxx.xxx.xxx.xxx
• IP yyy.yyy.yyy.yyy
• IP zzz.zzz.zzz.zzz
Unidentified (New)
Continued use
Reuse
9
Most of indicators (attack infrastructure) are
used just once
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
80% >
Used just once
My research
focuses on this part
10
Hypothesis of my research
Indicators on CTI show the attackers' footprints
Classify the indicators as the following 3 categories
Disposable (used just once)
Long life
Reuse
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED11
Image of how to use the result of indicator
learning
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Real-time type
CTI sources
Black list
(Detection list)
Analysis type
CTI sources
Most of them are vanished
soon, but need to deal them
CTI platform
Special IP and
domain
A vast amount of
(unidentified) real-
time indicator
Extra deal,
more analysis
Indicator DB
12
Prior notice for indicator learning based on CTI
It's not a talk about deep learning or
clustering
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED13
1. Treasures buried in a vast amount of threat
information
CTI
STIX
Garbage
Treasures
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED14
Contents of the treasures
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED15
Real example 1 (1/2): Spam mails
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Hi xxxxxx,
Congratulations!
You have access to your free
trading cash!
The money is sitting and waiting
in your account now.
Access Here Now
Thanks again
Dennis Mcclain
http://sectorservices[.]com[.]br/
components/com_tz_portfolio/v
iews/gallery/tmpl/
187.17.111[.]105
DNS
16
Indicator DB
Real example 1 (2/2): Usage of indicator learning
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
187.17.111[.]105
17
Real example 2 (1/2): Kelihos botnet
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Life-span of Botnet indicator (IP address) of Kelihos botnet in 2015
11 (/ 39,937)
lived for more
then 46 weeks
97.5% vanished
within 4 weeks
xx.xx.xx.41: 4/13 - 4/14
xx.xx.xx.42: 3/16
xx.xx.xx.46: 3/28 - 6/19
xx.xx.xx.47: 3/8 - 3/13
xx.xx.xx.48: 5/21 - 5/22
xx.xx.xx.51: 5/1 - 6/14
18
Real example 2 (2/2): Kelihos botnet
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Treasures are buried
19
Real example 3: Estimation of attack trends
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Long life type → DownloaderDisposable type → Botnet, DGA, etc
20
Real example 4 (1/2): Monitoring IP addresses that
could be used potentially by malicious activities
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
2014 at
present
2015 2016
GameOverZeus
Sality
CryptoWall
Tinba
DGA
21
Real example 4 (2/2): Verifications using passive
DNS services
 Passive Total by RiskIQ
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Learning period
based on CTI
LOCKY spam
June 2016
4 (3rd) →
19 (4th) →
209 (5th)
398 (20th) →
573 (21st) →
584 (22nd)
22
2. Contents of the treasures
Long-life indicators
Attack trends
Proactive defenses
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED23
The way of searching treasures
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED24
CTI (indicators on CTIs) is a collection of biased
data
 The trouble of learning CTI indicators: a mass of bias
 In machine learning, statistical information of learning data is to be applied for
future...
 Unbalanced number of CTIs depending on specific malware (campaign)
 Ex. WannaCry, Petya, Bad Rabbit
 Bias of the quality of indicators
 Most of indicators are new (unidentified) or related to a part of a vast amount of CTIs
 Bias (difference) of the quality of attacks
 Botnet (distribution, non-discriminational type) or APT (Targeted)
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED25
Indicator learning
It's not enough just simply to apply standard algorithms
Majority: Use just once
Booms: Botnets etc use and then dispose a lot
Classification/Identification: Most of indicators can identify
malware
Searching treasures: Return to a problem to reveal
rare patterns (treasures)
Unable to find treasures by blindly searching all the
CTIs
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED26
Structure of indicator learning
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
CTI data source 1
Subgroup 1 Subgroup 2 Subgroup i⋯
Preprocessing
Indicator learning
Indicator DB
CTI data source 2 CTI data source 3
27
Preprocessing
Basically assume
the STIX format
and use a XML
parser
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
<stix:STIX_Package …>
<stix:STIX_Header>
…
</stix:STIX_Header>
<stix:Observables…>
…
<cybox:Title> IP addresses </cybox:Title>
…
<AddressObj:Address_Value> xxx.xxx.xxx.xxx </AddressObj:Address_Value>
…
<cybox:Title>Cerber IP addresses </cybox:Title>
…
<AddressObj:Address_Value> yyy.yyy.yyy.yyy </AddressObj:Address_Value>
…
</stix:Observables>
<stix:STIX_TTPs>
…
<ttp:Title> … </ttp:Title>
…
</stix:STIX_TTPs>
<stix:Campaigns>
…
<campaign:Title> Campaign1 </campaign:Title>
…
</stix:Campaigns>
…
28
Sub-grouping CTIs
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
• IP 1-1
• IP 1-2
• Domain 1-1
• ⋯
Subgroup1 - GOZ
CTI data source 1
Preprocessing
CTI data source 2 CTI data source 3
• IP 2-1
• IP 2-2
• Domain 2-1
• ⋯
⋯
• IP i-1
• IP i-2
• Domain i-1
• ⋯
Timeline
• IP 1-1
• IP 1-2
• Domain 1-1
• ⋯
Subgroup2 - Upatre
• IP 2-1
• IP 2-2
• Domain 2-1
• ⋯
⋯
• IP i-1
• IP i-2
• Domain i-1
• ⋯
Timeline
• IP 1-1
• IP 1-2
• Domain 1-1
• ⋯
Subgroup3 - Kelihos
• IP 2-1
• IP 2-2
• Domain 2-1
• ⋯
⋯
• IP i-1
• IP i-2
• Domain i-1
• ⋯
Timeline
• IP 1-1
• IP 1-2
• Domain 1-1
• ⋯
Subgroup4 - Pony
• IP 2-1
• IP 2-2
• Domain 2-1
• ⋯
⋯
• IP i-1
• IP i-2
• Domain i-1
• ⋯
Timeline
 GameOverZeus, Upatre, Kelihos, Pony, Locky, Domain Generation Algorithm, Dridex, DyreTrojan,
Cryptowall, Sality, Tinba, Torrent, KOL, Madness, APT28, APT10, Fallout, Lazarus, WannaCry, Petya
29
Learning life-span of indicators
As an indicator for CTIs, how long should it be kept?
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
• IP 1
• IP 2
CTI at 2/1 CTI at 2/8 CTI at 2/15 CTI at 2/22
CTIs related to a specific malware
• IP 1
• IP 3
• IP 1
• IP 4
• IP 1
30
Real example 2 (1/2): Kelihos botnet
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec
Life-span of Botnet indicator (IP address) of Kelihos botnet in 2015
11 (/ 39,937)
lived for more
then 46 weeks
97.5% vanished
within 4 weeks
xx.xx.xx.41: 4/13 - 4/14
xx.xx.xx.42: 3/16
xx.xx.xx.46: 3/28 - 6/19
xx.xx.xx.47: 3/8 - 3/13
xx.xx.xx.48: 5/21 - 5/22
xx.xx.xx.51: 5/1 - 6/14
31
Weighting indicators
 Compare IP addresses and domains between multiple subgroups
 Contrast Set Mining [Bay et.al 2001]
 Emerging Patterns [Dong and Li 1999]
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
itemset A
32
DB 1 DB 2
Possible to identify
itemset A
No appearance
IP, domain
Malware,
Campaign
IP addresses shared by multiple malwares
 More than 99%: Single subgroup
 Less than 1%: Multiple subgroups
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
456 / 58048:
0.79%
33
Real example 4 (1/2): Monitoring IP addresses that
could be used potentially by malicious activities
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
2014 at
present
2015 2016
GameOverZeus
Sality
CryptoWall
Tinba
DGA
34
Conclusion
1. Treasure is buried in CTIs
2. Need to have talented
guides to search treasures
Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED35
36

More Related Content

What's hot

US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesAbhishek Singh
 
Отчет Executive overview RAPID7
Отчет  Executive overview RAPID7Отчет  Executive overview RAPID7
Отчет Executive overview RAPID7Sergey Yrievich
 
TRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS MalwareTRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS MalwareThomas Roccia
 
CoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVCoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVThomas Roccia
 
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...Cyphort
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...CODE BLUE
 
Malware analysis - What to learn from your invaders
Malware analysis - What to learn from your invadersMalware analysis - What to learn from your invaders
Malware analysis - What to learn from your invadersTazdrumm3r
 
Adaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksAdaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksJermund Ottermo
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!Nahidul Kibria
 
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Igor Korkin
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
 
Dissecting ZeuS malware
Dissecting ZeuS malwareDissecting ZeuS malware
Dissecting ZeuS malwareCyphort
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]RootedCON
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerFelipe Prado
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRootedCON
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationTamas K Lengyel
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomPriyanka Aash
 

What's hot (20)

US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
 
Отчет Executive overview RAPID7
Отчет  Executive overview RAPID7Отчет  Executive overview RAPID7
Отчет Executive overview RAPID7
 
TRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS MalwareTRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS Malware
 
CoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVCoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLV
 
Hunt down the evil of your infrastructure
Hunt down the evil of your infrastructureHunt down the evil of your infrastructure
Hunt down the evil of your infrastructure
 
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
 
Malware analysis - What to learn from your invaders
Malware analysis - What to learn from your invadersMalware analysis - What to learn from your invaders
Malware analysis - What to learn from your invaders
 
Adaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksAdaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber Attacks
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!
 
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluc...
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Dissecting ZeuS malware
Dissecting ZeuS malwareDissecting ZeuS malware
Dissecting ZeuS malware
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware Virtualization
 
20150909_network_security_lecture
20150909_network_security_lecture20150909_network_security_lecture
20150909_network_security_lecture
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
 

Similar to Detection index learning based on cyber threat intelligence and its application by Tsuyoshi Taniguchi

[CB18] Discover traces of attackers from the remains of disposable attack inf...
[CB18] Discover traces of attackers from the remains of disposable attack inf...[CB18] Discover traces of attackers from the remains of disposable attack inf...
[CB18] Discover traces of attackers from the remains of disposable attack inf...CODE BLUE
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi TaniguchiCODE BLUE
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKKatie Nickels
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data centerNur Shiqim Chok
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center NetworkCollaborators
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Linux IoT Botnet Wars and the lack of basic security hardening
Linux IoT Botnet Wars and the lack of basic security hardeningLinux IoT Botnet Wars and the lack of basic security hardening
Linux IoT Botnet Wars and the lack of basic security hardeningMender.io
 
IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET Journal
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET Journal
 
04 - Blockchain Technology - Hyperledger Fabric
04 - Blockchain Technology - Hyperledger Fabric04 - Blockchain Technology - Hyperledger Fabric
04 - Blockchain Technology - Hyperledger FabricITROOS
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation methodAcad
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryKeith Chapman
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxjackiewalcutt
 

Similar to Detection index learning based on cyber threat intelligence and its application by Tsuyoshi Taniguchi (20)

[CB18] Discover traces of attackers from the remains of disposable attack inf...
[CB18] Discover traces of attackers from the remains of disposable attack inf...[CB18] Discover traces of attackers from the remains of disposable attack inf...
[CB18] Discover traces of attackers from the remains of disposable attack inf...
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
How We Protected Our Router
How We Protected Our RouterHow We Protected Our Router
How We Protected Our Router
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data center
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Linux IoT Botnet Wars and the lack of basic security hardening
Linux IoT Botnet Wars and the lack of basic security hardeningLinux IoT Botnet Wars and the lack of basic security hardening
Linux IoT Botnet Wars and the lack of basic security hardening
 
IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using Honeypot
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
 
04 - Blockchain Technology - Hyperledger Fabric
04 - Blockchain Technology - Hyperledger Fabric04 - Blockchain Technology - Hyperledger Fabric
04 - Blockchain Technology - Hyperledger Fabric
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industry
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docx
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 

Recently uploaded (20)

BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 

Detection index learning based on cyber threat intelligence and its application by Tsuyoshi Taniguchi

  • 1. Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Indicator learning based on cyber threat intelligence and its application Overview 〜 Searching treasures from a vast amount of threat information 〜 0 CODE BLUE Day0 - Special Track Counter Cyber Crime Track (November 8, 2017) FUJITSU SYSTEM INTEGRATION LABORATORIES LTD. Tsuyoshi TANIGUCHI
  • 2. Treasures buried in a vast amount of threat information Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED1
  • 3. Cyber Threat Intelligence Cyber Threat Intelligence: CTI A report that is created to share knowledge on a particular thread Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED2
  • 4. The traditional CTI: Shared by text Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED For a cyberattack called ○○, the involvement of an attacker named △△ is strongly suspected. As the method of attack, malware called □□ connecting to C&C server with IP xx.xx.xx.xx has been observed. 3
  • 5. Next CTI: Readable by machines Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED <tag threat-name> ○○ </threat-name> <tag attacker> △△ </attacker> <tag attack-method> □□ </attack-method> <tag ip> xx.xx.xx.xx </ip> 4
  • 6. STIX (Structured Threat Information eXpression) Format  One of the CIT standards  Consist of 8 information groups Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED IPA's outline of STIX https://www.ipa.go.jp/security/vuln/STIX.html 5 Intent of Cyber attack activities Indicators to detect attacks Events observed by attacks Behaviors and methods of cyber attackers Incidents People/organizations involved to cyber attacks Vulnerabilities of targeted software, systems, and configurations Countermeasures against threats
  • 7. Issues to work on Analysts have too much CTIs to analysis Encourage to share CIT using AIS (Automated Indicator Sharing) A vast amount of CTI could turn into garbage Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED6
  • 8. Motivation To help analysts, find special CTIs (treasures) that describe attackers from a vast amount of CTIs (garbage) Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED7
  • 9. Image of searching treasures from CTIs Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Real-time type CTI sources Others Analysis type CTI sources CTI platform Treasures (Special CTIs) 8
  • 10. Indicators  Indicators to detect attacks with elements of CTIs  Type of indicators  IP address ←Target  Domain ←Target  Host  E-mail  URL  Hash: MD5, SHA1, SHA256, PEHASH, IMPHASH  … Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED • IP xxx.xxx.xxx.xxx • IP yyy.yyy.yyy.yyy • IP zzz.zzz.zzz.zzz Unidentified (New) Continued use Reuse 9
  • 11. Most of indicators (attack infrastructure) are used just once Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 80% > Used just once My research focuses on this part 10
  • 12. Hypothesis of my research Indicators on CTI show the attackers' footprints Classify the indicators as the following 3 categories Disposable (used just once) Long life Reuse Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED11
  • 13. Image of how to use the result of indicator learning Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Real-time type CTI sources Black list (Detection list) Analysis type CTI sources Most of them are vanished soon, but need to deal them CTI platform Special IP and domain A vast amount of (unidentified) real- time indicator Extra deal, more analysis Indicator DB 12
  • 14. Prior notice for indicator learning based on CTI It's not a talk about deep learning or clustering Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED13
  • 15. 1. Treasures buried in a vast amount of threat information CTI STIX Garbage Treasures Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED14
  • 16. Contents of the treasures Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED15
  • 17. Real example 1 (1/2): Spam mails Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Hi xxxxxx, Congratulations! You have access to your free trading cash! The money is sitting and waiting in your account now. Access Here Now Thanks again Dennis Mcclain http://sectorservices[.]com[.]br/ components/com_tz_portfolio/v iews/gallery/tmpl/ 187.17.111[.]105 DNS 16
  • 18. Indicator DB Real example 1 (2/2): Usage of indicator learning Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 187.17.111[.]105 17
  • 19. Real example 2 (1/2): Kelihos botnet Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Life-span of Botnet indicator (IP address) of Kelihos botnet in 2015 11 (/ 39,937) lived for more then 46 weeks 97.5% vanished within 4 weeks xx.xx.xx.41: 4/13 - 4/14 xx.xx.xx.42: 3/16 xx.xx.xx.46: 3/28 - 6/19 xx.xx.xx.47: 3/8 - 3/13 xx.xx.xx.48: 5/21 - 5/22 xx.xx.xx.51: 5/1 - 6/14 18
  • 20. Real example 2 (2/2): Kelihos botnet Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Treasures are buried 19
  • 21. Real example 3: Estimation of attack trends Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Long life type → DownloaderDisposable type → Botnet, DGA, etc 20
  • 22. Real example 4 (1/2): Monitoring IP addresses that could be used potentially by malicious activities Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 2014 at present 2015 2016 GameOverZeus Sality CryptoWall Tinba DGA 21
  • 23. Real example 4 (2/2): Verifications using passive DNS services  Passive Total by RiskIQ Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Learning period based on CTI LOCKY spam June 2016 4 (3rd) → 19 (4th) → 209 (5th) 398 (20th) → 573 (21st) → 584 (22nd) 22
  • 24. 2. Contents of the treasures Long-life indicators Attack trends Proactive defenses Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED23
  • 25. The way of searching treasures Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED24
  • 26. CTI (indicators on CTIs) is a collection of biased data  The trouble of learning CTI indicators: a mass of bias  In machine learning, statistical information of learning data is to be applied for future...  Unbalanced number of CTIs depending on specific malware (campaign)  Ex. WannaCry, Petya, Bad Rabbit  Bias of the quality of indicators  Most of indicators are new (unidentified) or related to a part of a vast amount of CTIs  Bias (difference) of the quality of attacks  Botnet (distribution, non-discriminational type) or APT (Targeted) Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED25
  • 27. Indicator learning It's not enough just simply to apply standard algorithms Majority: Use just once Booms: Botnets etc use and then dispose a lot Classification/Identification: Most of indicators can identify malware Searching treasures: Return to a problem to reveal rare patterns (treasures) Unable to find treasures by blindly searching all the CTIs Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED26
  • 28. Structure of indicator learning Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED CTI data source 1 Subgroup 1 Subgroup 2 Subgroup i⋯ Preprocessing Indicator learning Indicator DB CTI data source 2 CTI data source 3 27
  • 29. Preprocessing Basically assume the STIX format and use a XML parser Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED <stix:STIX_Package …> <stix:STIX_Header> … </stix:STIX_Header> <stix:Observables…> … <cybox:Title> IP addresses </cybox:Title> … <AddressObj:Address_Value> xxx.xxx.xxx.xxx </AddressObj:Address_Value> … <cybox:Title>Cerber IP addresses </cybox:Title> … <AddressObj:Address_Value> yyy.yyy.yyy.yyy </AddressObj:Address_Value> … </stix:Observables> <stix:STIX_TTPs> … <ttp:Title> … </ttp:Title> … </stix:STIX_TTPs> <stix:Campaigns> … <campaign:Title> Campaign1 </campaign:Title> … </stix:Campaigns> … 28
  • 30. Sub-grouping CTIs Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED • IP 1-1 • IP 1-2 • Domain 1-1 • ⋯ Subgroup1 - GOZ CTI data source 1 Preprocessing CTI data source 2 CTI data source 3 • IP 2-1 • IP 2-2 • Domain 2-1 • ⋯ ⋯ • IP i-1 • IP i-2 • Domain i-1 • ⋯ Timeline • IP 1-1 • IP 1-2 • Domain 1-1 • ⋯ Subgroup2 - Upatre • IP 2-1 • IP 2-2 • Domain 2-1 • ⋯ ⋯ • IP i-1 • IP i-2 • Domain i-1 • ⋯ Timeline • IP 1-1 • IP 1-2 • Domain 1-1 • ⋯ Subgroup3 - Kelihos • IP 2-1 • IP 2-2 • Domain 2-1 • ⋯ ⋯ • IP i-1 • IP i-2 • Domain i-1 • ⋯ Timeline • IP 1-1 • IP 1-2 • Domain 1-1 • ⋯ Subgroup4 - Pony • IP 2-1 • IP 2-2 • Domain 2-1 • ⋯ ⋯ • IP i-1 • IP i-2 • Domain i-1 • ⋯ Timeline  GameOverZeus, Upatre, Kelihos, Pony, Locky, Domain Generation Algorithm, Dridex, DyreTrojan, Cryptowall, Sality, Tinba, Torrent, KOL, Madness, APT28, APT10, Fallout, Lazarus, WannaCry, Petya 29
  • 31. Learning life-span of indicators As an indicator for CTIs, how long should it be kept? Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED • IP 1 • IP 2 CTI at 2/1 CTI at 2/8 CTI at 2/15 CTI at 2/22 CTIs related to a specific malware • IP 1 • IP 3 • IP 1 • IP 4 • IP 1 30
  • 32. Real example 2 (1/2): Kelihos botnet Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec Life-span of Botnet indicator (IP address) of Kelihos botnet in 2015 11 (/ 39,937) lived for more then 46 weeks 97.5% vanished within 4 weeks xx.xx.xx.41: 4/13 - 4/14 xx.xx.xx.42: 3/16 xx.xx.xx.46: 3/28 - 6/19 xx.xx.xx.47: 3/8 - 3/13 xx.xx.xx.48: 5/21 - 5/22 xx.xx.xx.51: 5/1 - 6/14 31
  • 33. Weighting indicators  Compare IP addresses and domains between multiple subgroups  Contrast Set Mining [Bay et.al 2001]  Emerging Patterns [Dong and Li 1999] Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED itemset A 32 DB 1 DB 2 Possible to identify itemset A No appearance IP, domain Malware, Campaign
  • 34. IP addresses shared by multiple malwares  More than 99%: Single subgroup  Less than 1%: Multiple subgroups Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 456 / 58048: 0.79% 33
  • 35. Real example 4 (1/2): Monitoring IP addresses that could be used potentially by malicious activities Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 2014 at present 2015 2016 GameOverZeus Sality CryptoWall Tinba DGA 34
  • 36. Conclusion 1. Treasure is buried in CTIs 2. Need to have talented guides to search treasures Copyright 2017 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED35
  • 37. 36

Editor's Notes

  1. 0
  2. この講演では,サイバー脅威インテリジェンスを CTI というワードで説明していく予定. 脅威インテリジェンス,脅威情報,Threat Intelligence ともいう.
  3. 基本的な共有方法で,人間が読むことを想定し,pdf やメールで共有.
  4. この絵自体はあまり説明しない予定です. 次のスライドへつなげるために,indicators: 攻撃を検知するための指標,を説明. 世界的な標準により,機械可読が普及していくと考えている.
  5. CTI は情報共有の性質から共有自体がされるのか懐疑的な意見もあったが, DHS の AIS により,現在大量の IP アドレス等が共有される時代になっている.
  6. 「検知指標」の英語表現は STIX 形式の表現に従って「indicator」でお願いします
  7. ・攻撃者が攻撃インフラの使い方に痕跡を残す(残ってしまう)場合がある  ・ある攻撃者が愛用している IP アドレス  ・ある攻撃者は検知を気にせずに攻撃インフラを使用   ・どうしても一定数は URL をふんでしまう   ・あるいは,攻撃インフラ構築のコストの節約のため,あえて同じインフラを使い続ける ・攻撃者の残した痕跡は CTI 上の検知指標に表れる
  8. ・【通常】特定のマルウェアやキャンペーンを識別するために利用  ・自社で感染したマルウェアの C&C サーバへの通信を検知  ・外から自社への怪しい通信を検知 ・攻撃のトレンドをウォッチするために利用  ・必ずしも自社で観測された情報である必要はない ・リアルタイムに流れてくる検知指標の選別  ・ほとんどは未識別で,過去のインテリジェンスと無関係  ・一部の著名なマルウェア(キャンペーン)の検知指標が流れてくることがあり,選別するための仕組みが必要
  9. ふりかえり ここまで説明してきた内容を聴衆に確認します
  10. 実際に受信したスパムメール
  11. 重要なのは,IP などを入力にして,プラットフォームを使って CTI を検索して CTI のレポートを確認して… の前に,過去のどのような悪性活動とかかわっていたか,すぐに判別できること CTI や IP アドレスの数が多くなってくると,大きな差が生まれる 深堀する必要があるとわかれば,そこからじっくり分析をはじめればよい
  12. 2010 年に発見された Kelihos は,ピーク時に 42,000 台の端末を感染させた強力なボットネット 「Levashov はホットネット 『Kelihos』 の主犯格として逮捕された」 という情報が英語圏の数多くのメディアで取り上げられる (4/10) 「ボットネット運営者? トランプを当選させた男? 悪名高きロシア人サイバー犯罪者がバルセロナで逮捕される」 より ・上記のような説明を口頭で簡単にする予定 ここで説明したいのは,ボットネット活動の中でほとんどの IP アドレスが使い捨てられる中で, 11個の IP は1年近く活動に使われ続けたこと この IP は攻撃者の傾向がより表れている可能性が高い 図中の期間は,CTI から生存期間を評価した IP アドレスに対して, パッシブDNSサービスで悪性ドメインが登録されていた期間を示している 悪性ドメインは早い場合で1日で消滅
  13. Kelihos ボットネットの検知指標 (IP アドレス)のヒストグラム 横軸は生存期間(生存週),縦軸は検知指標の数 前スライドの 11 個の 1 年近く生存した IP は右はじの 24 週以上に相当し, 統計上は外れ値や異常値と判定されかねない IP であっても, 攻撃者傾向が強く表れている可能性が高い IP として注目する
  14. 1つ1つの検知指標の学習をした後に, 特定のマルウェアやキャンペーンで検知指標を集約すると, 攻撃の傾向が表れる場合がある 前スライドと同じ内容のヒストグラムで,別のマルウェアの例 横軸と縦軸も同じ GOZ では95%が1週で消滅する使い捨てタイプ Upatre では 25%が半年以上利用される長寿命タイプ ボットネット (GOZ) とダウンローダ (Upatre)は,分析しなくてもある程度攻撃インフラの使い方は予測できるものの, 明らかになった攻撃傾向を基にして,新規に検知指標を受信したときに, その検知指標がどの程度使われそうか,推測することが可能となる
  15. 攻撃者の傾向が表れている特別な検知指標による先回り防御について検討中の内容について紹介. この例では,2014 年から 2015 年にかけて,複数のマルウェアの CTI に出現した IP アドレスについて紹介. 四角は具体的な IP アドレス (今回はデータを利用させてもらっているベンダーに配慮して値は出さない) 四角の中の色付きのエリアはその IP が CTI に出現したことを表す この IP のように,過去複数のマルウェアの活動で観察されてきた IP は, またほかの活動でも観察される可能性があるのでは,と監視する. ちなみに,この資料を作成している段階で, FireEye のあるアナリストの分析で明らかになったことによると, この IP は2014年あたりには既にシンクホールになっていたと推定され, 直接攻撃インフラに利用されていたわけではなさそうだが, 様々な悪性活動に反応する IP となっていた模様.
  16. 前のスライドにおいて説明した IP アドレスに関連づいているドメインの数を パッシブDNSサービスである PassiveTotal を利用して検証. 左は各四半期の最終日の登録ドメイン数をプロットしたもの. 右は2016年の6月の日別の登録ドメイン数をプロットしたもの. 2015年までの学習で明らかにできていた IP を 2016年に監視できていたとしたら, 2016年6月のロッキースパムによる初動をとらえることができていた
  17. ふりかえり ここまで説明してきた内容を聴衆に確認します
  18. 大体書いてある通りに,情報を補足しながら話します.
  19. 大体書いてある通りに,情報を補足しながら話します. 全ての攻撃に共通する性質はなく,局所のデータ集合に限定した性質を積み重ねる類の問題
  20. サブグループ:特定のマルウェアやキャンペーンに関する CTI に含まれる IP ・ドメインの集合 宝が見つかりやすいように,宝のありかにある程度あたりをつける
  21. 宝のありかにあたりをつけるアプローチ
  22. 前のスライドの結果として,再掲 既に説明している結果なので,ほとんど説明しません.
  23. コントラストセットマイニングの考え方を検知指標に応用
  24. 前のスライドの結果として,再掲 既に説明している結果なので,ほとんど説明しません.