SlideShare a Scribd company logo
Big Data for Security
Marco Casassa Mont
Security and Manageability Lab
Hewlett Packard Labs
November 2015
Transfer
HPE Security SW Solution:
DNS Malware Analytics
2
The ArcSight Portfolio
Intelligence Packages (Content)
Connectors
Logger ESM
ArcMC
Marketplace
Analytics
Intelligence Packages (Content)
Connectors
Logger ESM
Management(ArcMC)
Marketplace
DNSMalware
Analytics
UserBehaviorAnalytics
InteractiveDiscovery
Analytics
HPE Labs - Big Data for Security
Overview
4
Project overview
– Helping organizations to detect new, unknown security
threats by collecting, storing, analyzing, and visualizing
massive amounts of security events
– Use case: Domain Name Server (DNS):
– Huge data logs (HPE IT pilot: 16-20B DNS packets/day)
– Most malware uses DNS to communicate to command and
control centers
– Wide range of attacks from commoditized malware to
advanced persistent threats (APTs)
– Solution piloted with HPE IT worldwide and in 2
customers’ PoC
– Ongoing technology transfer with HPE SW (product) and
HPE Security Services (managed security service)
5
www.hpe.co
m
16.110.135.51
6
Adapted from Lockheed
Martin’s Cyber Kill Chain
Research
Infiltration
Exfiltration
Our enterprise
Discovery
Capture
Their
ecosyste
m
The security operations challenge
Email
Hotline/help desk
call center
Other
IDS
Triage
Incident
report Resolution
Analyze
Obtain contact
information
Provide
technical
assistance
Coordinate
Information and
response
Information
request
Vulnerability
report
Weeks -> ? Days Months
CMU CERT/CC Incident Lifecycle
Security operations research
Email
Hotline/help desk
call center
Other
IDS
Triage
Incident
report Resolution
Analyze
Obtain contact
information
Provide
technical
assistance
Coordinate
Information and
response
Information
request
Vulnerability
report
Early detection
(Big Data)
Rapid response
(software-defined
networking)
What is DNS?
Client /
server
Local DNS
server
DNS root “.”
DNS.com
DNS
company.com
Query: service.company.com?
Check for zone
Check cache
REPLY: 58.25.88.90
DNS traffic generated by:
- Users (e.g. by browsing web
sites)
- Applications, servers, etc.
The scale of DNS data
HPE IT operates ArcSight
internally.
Once fully deployed, it will be
25% larger than any other non-
governmental installation by
volume.
DNS traffic per HPE data
center:
– 120,000 events/second
– ~64B events/day globally
1
10
100
1000
10000
100000
1000000
Routers VPN McAfee ePO Active Directory Web Proxy DNS
Eventspersecond(logarithmicscale)
0
20000
40000
60000
80000
100000
120000
140000
Routers VPN McAfee ePO Active Directory Web Proxy DNS
Eventspersecond(linearscale)
Abuse case
Compromised server
Victim
Compromised
DNS server
www.hpe.com?1
12.34.56.782
Abuse case
Botnet command and control
Bot DNS server
akaajkajkajd.cn?
xisyudnwuxu.ru?
dfknwerpbnp.biz?
mneyqslgyb.info?
cspcicicipisjjew.hu?
C2 Server
(mneyqslgyb.info)
Attacker can’t maintain C2 server
at IP address for very long.
So it registers a random domain
name temporarily.
Bot tries a bunch of random
names until it finds one that
resolves.
AssetAsset
Abuse case
DNS tunneling (via subdomains)
Bot DNS server (Compromised) DNS
server
(example.com)
93cc3daf.example.com4fac3215.example.coma86f4221.example.comddee9152.example.com8bd5ff12.example.comd4bb92a1.example.comef409132.example.com1bfa3207.example.com298c5b3a.example.com
Solution architecture: Overview
14
DNS server(s)
HPL
DNS packet
capture
Whitelist
network
tap
DNS queries
and responses
ArcSight
Logger
ArcSight
ESM
Blacklist
Threat insight:
HPL Security Analytics and Visualization
Solution
Event logging Correlation and
alerting
Real-time processing
Near-time, historical analysis
DNS events:
queries and replies
Event
pre-
processor
Events
Syslog
Server
Security analytical workflows
Analytics scheduler
Anomaly
detection
Threat
indicators
Visualization
processing
Web server
15
Security
event logs
Network systems
HPL DNS
Packet
Capture
Filtered
DNS events
ESM
alerts
Real-time analysis Historical analysis
ESM
Logger
ESM GUI
Alert manager
HPELThreat
Indicators&Anomaly
DetectionLibrary
HPE Labs Big Data Analytics Solution
ArcSight
Vertica
Anomalies, threats, graphs
Demo …
16
More details about Security
Analytics …
17
Security analytics
18
Extended analytical framework to provide:
1. Analytics-based on Blacklisted DNS Events
2. Analytics-based on Random Domain Names
(DGA domains). Tipping Point/DVLabs
Collaboration
3. Analytics based on Data Exfiltration
Security analytical workflows
Analytics scheduler
Anomaly
Detection
Threat
Indicators
Visualizatio
n
processing
Web serverAlert manager
HPLthreat
Indicators&anomaly
Detectionlibrary
Threat insight: HPL big data analytics solution
HP Vertica
Analytics based on
blacklisted events
19
1. Usage of TippingPoint RepDV
2. Client-based aggregations of high score,
blacklisted domains
3. Detection of abnormal patterns:
– Large percentage of queries (>50%)
– Bad domain names queried for the first time
– More than 5% towards same domain
– …
Analytics based on random generated domains (DGA)
1. Various techniques to detect DGA domains,
including forbidden bigrams and
classification (TippingPoint)
2. Client-based aggregations to identify
infected devices
3. Detection of abnormal patterns:
1. High number of NXDOMAINS with a few resolving ones
2. High number of domains with similar classifications
(Zeus, Virut, Conficker-AB,…)
Analytics based on data exfiltration
– Various techniques to detect domains used for DNS based Exfiltration and Tunneling
– Client-based aggregations to identify infected devices
– Detection of abnormal patterns:
– Very long, odd looking, frequent domain names
– Statistical analysis of domains to identify encoding
Further R&D Work
23
Problem Areas and Opportunities
HPE CONFIDENTIAL 24
1. Detection of serious, targeted attacks (including APTs) posing major risks
to organisations
2. Remediation/Mitigation of Threats in timely manner
• Collecting, processing and analysing huge, heterogeneous data sets
• Limitation of current collection and computational models
• Limitation of current security analytics and detection approaches
• Use massive NV memory and computing power
• Grounded security use cases, jointly with HP IT and customers
3. Innovate in the space of “Security Analytics for The Machine”
• Localization of resources
• Dynamic, virtualised environments
• Very fragmented IT approaches
• Lack of impact analysis
Architectural Overview
HPE CONFIDENTIAL 25
DNS
Web proxy
Network
Traffic (SFlow
…)
IP-MAC-
Hostname
IT
Infrastructure,
Containers,
The Machine Big Data
Storage
In-Memory
Storage
Threat
Models
Distributed
Analytical
Engines &
Anomaly
Detection
Common Framework & APIs
Tools & Visualizations
Continuous/OnDemandData
Collection&processing
SDN
NFV
Instrumented
Containers
Traditional
IT & SOC
…
Multiple
Data Sources
Next generation Analytical Engines
& Threat Management Tools
Remediation Engines
& Workflows
Remediation
Mechanisms
Programmable
Data Collection
User/DC/…
Hybrid Storage Mgmt
Analytic
s
Library
Remediation
Engines
Remediation
Workflows
Impact
Analysis
Data Sources &
Agents
Kafka
Cluster
Storm Cluster
HDFS
Cluster
Other
Logging/
Brokering
Mechanisms
Vertica Cluster
Spark
HBASE+HIVE
Elastic Search
SQL Tools
Analytical
Framework
& Engine
Analytics
Advanced
Threat
Detection
Workflow & Tracking
Models Visualization
Remediation
Processing Pipeline & Infrastructure
Next Generation – HPE Labs’ Prototype
Data Types
DNS Web Proxy SFlow IP-MAC-Host DC/User Logs Firewall/VPN/…
Data Abstraction
Layer
Attribute
s
Data processing
Pipeline Event Buffering & Brokering (e.g. Kafka, …)
Event Pre-processing & pre-Analytics (e.g. Storm, …)
Analytic
Engines
Advanced Threat Detection:
Workflow & Tracking
Attribute
s
Attribute
s
Attribute
s
Attribute
s
Attribute
s
Library of Plug & Play
Threat Analytic
Modules
Persistent Storage
(e.g. Vertica, Hadoop, …)
In Memory Storage
(e.g. Regis, MongoDB, GraphX
…)
REST
APIs
REST
APIs
Library of
Threat Models
Visualization Data Exploration
Web Services
Threat Tracking
Data and
Evidence
HPE CONFIDENTIAL 10
DMA Backup
28
Productisation
29
Screenshot from HPE DNS Malware Analytics
– Cloud-based managed
or self-service analytics
with on-premises
capture modules
– Yearly subscription
– Bolt-on upgrades
– Events per second
– Number of capture
modules
This is a rolling (up to 3-year) Roadmap and is subject to change
without notice.
Service architecture
DNS Capture Module
DNS analytics
Alerts (infected system)
Web-based detail and
visual
Drill-down
Level 1
Analyst
Hunt
Team
• Filter out 99% of traffic*
• Tag events (blacklist
matching, DGA detection)
• Statistics and diagnostics
• Constantly analyze DNS data for
security threats
• Alerting
• Data visualization and exploration
• SaaS/Cloud
DNS Capture Module
Enterprise
SOC
DNS server/cluster
Analytics cloud
* HPE CDC
SIEM
UI

More Related Content

What's hot

Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
Export Promotion Bureau
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
DataWorks Summit
 
How big data and AI saved the day: critical IP almost walked out the door
How big data and AI saved the day: critical IP almost walked out the doorHow big data and AI saved the day: critical IP almost walked out the door
How big data and AI saved the day: critical IP almost walked out the door
DataWorks Summit
 
Threat Detection and Response at Scale with Dominique Brezinski
Threat Detection and Response at Scale with Dominique BrezinskiThreat Detection and Response at Scale with Dominique Brezinski
Threat Detection and Response at Scale with Dominique Brezinski
Databricks
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
DataWorks Summit
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513
Alexander Doré
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 
Multi-tenant Hadoop - the challenge of maintaining high SLAS
Multi-tenant Hadoop - the challenge of maintaining high SLASMulti-tenant Hadoop - the challenge of maintaining high SLAS
Multi-tenant Hadoop - the challenge of maintaining high SLAS
DataWorks Summit
 
Lessons learned from over 25 Data Virtualization implementations
Lessons learned from over 25 Data Virtualization implementationsLessons learned from over 25 Data Virtualization implementations
Lessons learned from over 25 Data Virtualization implementations
Denodo
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
Nicolas Morales
 
Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)
Denodo
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0
DataWorks Summit
 
Empower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
Empower Splunk and other SIEMs with the Databricks Lakehouse for CybersecurityEmpower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
Empower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
Databricks
 
Practical advice to build a data driven company
Practical advice to build a data driven companyPractical advice to build a data driven company
Practical advice to build a data driven company
DataWorks Summit/Hadoop Summit
 
Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics
DataWorks Summit/Hadoop Summit
 
Big Data at Geisinger Health System: Big Wins in a Short Time
Big Data at Geisinger Health System: Big Wins in a Short TimeBig Data at Geisinger Health System: Big Wins in a Short Time
Big Data at Geisinger Health System: Big Wins in a Short Time
DataWorks Summit
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
DataWorks Summit
 
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Denodo
 
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
DataWorks Summit
 

What's hot (20)

Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
 
How big data and AI saved the day: critical IP almost walked out the door
How big data and AI saved the day: critical IP almost walked out the doorHow big data and AI saved the day: critical IP almost walked out the door
How big data and AI saved the day: critical IP almost walked out the door
 
Threat Detection and Response at Scale with Dominique Brezinski
Threat Detection and Response at Scale with Dominique BrezinskiThreat Detection and Response at Scale with Dominique Brezinski
Threat Detection and Response at Scale with Dominique Brezinski
 
Security Framework for Multitenant Architecture
Security Framework for Multitenant ArchitectureSecurity Framework for Multitenant Architecture
Security Framework for Multitenant Architecture
 
IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513IT_RFO10-14-ITS_AppendixA_20100513
IT_RFO10-14-ITS_AppendixA_20100513
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Multi-tenant Hadoop - the challenge of maintaining high SLAS
Multi-tenant Hadoop - the challenge of maintaining high SLASMulti-tenant Hadoop - the challenge of maintaining high SLAS
Multi-tenant Hadoop - the challenge of maintaining high SLAS
 
Lessons learned from over 25 Data Virtualization implementations
Lessons learned from over 25 Data Virtualization implementationsLessons learned from over 25 Data Virtualization implementations
Lessons learned from over 25 Data Virtualization implementations
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0
 
Empower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
Empower Splunk and other SIEMs with the Databricks Lakehouse for CybersecurityEmpower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
Empower Splunk and other SIEMs with the Databricks Lakehouse for Cybersecurity
 
Practical advice to build a data driven company
Practical advice to build a data driven companyPractical advice to build a data driven company
Practical advice to build a data driven company
 
Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics
 
Big Data at Geisinger Health System: Big Wins in a Short Time
Big Data at Geisinger Health System: Big Wins in a Short TimeBig Data at Geisinger Health System: Big Wins in a Short Time
Big Data at Geisinger Health System: Big Wins in a Short Time
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
 
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
 
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
Journey to the Data Lake: How Progressive Paved a Faster, Smoother Path to In...
 

Similar to Big Data for Security - DNS Analytics

McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
Iftikhar Ali Iqbal
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
APNIC
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
Novetta
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
Marco Casassa Mont
 
ESM 101 (ESM v6.9.1c)
ESM 101 (ESM v6.9.1c)ESM 101 (ESM v6.9.1c)
ESM 101 (ESM v6.9.1c)
Protect724tk
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Priyanka Aash
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Priyanka Aash
 
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
APNIC
 
ESM_101_6.9.0.pdf
ESM_101_6.9.0.pdfESM_101_6.9.0.pdf
ESM_101_6.9.0.pdf
Protect724v2
 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
Alex Henthorn-Iwane
 
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Studio Fiorenzi Security & Forensics
 
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion StoicaRISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
Spark Summit
 
RISELab:Enabling Intelligent Real-Time Decisions
RISELab:Enabling Intelligent Real-Time DecisionsRISELab:Enabling Intelligent Real-Time Decisions
RISELab:Enabling Intelligent Real-Time Decisions
Jen Aman
 
Apache Spark for Cyber Security in an Enterprise Company
Apache Spark for Cyber Security in an Enterprise CompanyApache Spark for Cyber Security in an Enterprise Company
Apache Spark for Cyber Security in an Enterprise Company
Databricks
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?
Dmitry Evteev
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Kevin Mao
 
Continuity Software 4.3 Detailed Gaps
Continuity Software 4.3 Detailed GapsContinuity Software 4.3 Detailed Gaps
Continuity Software 4.3 Detailed Gaps
GilHecht
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 

Similar to Big Data for Security - DNS Analytics (20)

McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
ESM 101 (ESM v6.9.1c)
ESM 101 (ESM v6.9.1c)ESM 101 (ESM v6.9.1c)
ESM 101 (ESM v6.9.1c)
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
 
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
 
ESM_101_6.9.0.pdf
ESM_101_6.9.0.pdfESM_101_6.9.0.pdf
ESM_101_6.9.0.pdf
 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
 
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
 
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion StoicaRISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
RISELab: Enabling Intelligent Real-Time Decisions keynote by Ion Stoica
 
RISELab:Enabling Intelligent Real-Time Decisions
RISELab:Enabling Intelligent Real-Time DecisionsRISELab:Enabling Intelligent Real-Time Decisions
RISELab:Enabling Intelligent Real-Time Decisions
 
Apache Spark for Cyber Security in an Enterprise Company
Apache Spark for Cyber Security in an Enterprise CompanyApache Spark for Cyber Security in an Enterprise Company
Apache Spark for Cyber Security in an Enterprise Company
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
 
Continuity Software 4.3 Detailed Gaps
Continuity Software 4.3 Detailed GapsContinuity Software 4.3 Detailed Gaps
Continuity Software 4.3 Detailed Gaps
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 

More from Marco Casassa Mont

Big Data for Security - Threat Analytics
Big Data for Security -  Threat AnalyticsBig Data for Security -  Threat Analytics
Big Data for Security - Threat Analytics
Marco Casassa Mont
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
Marco Casassa Mont
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
Marco Casassa Mont
 
Policy Management: An Overview
Policy Management: An OverviewPolicy Management: An Overview
Policy Management: An Overview
Marco Casassa Mont
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
Marco Casassa Mont
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 

More from Marco Casassa Mont (6)

Big Data for Security - Threat Analytics
Big Data for Security -  Threat AnalyticsBig Data for Security -  Threat Analytics
Big Data for Security - Threat Analytics
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
 
Policy Management: An Overview
Policy Management: An OverviewPolicy Management: An Overview
Policy Management: An Overview
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 

Recently uploaded

在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
y3i0qsdzb
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 

Recently uploaded (20)

在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 

Big Data for Security - DNS Analytics

  • 1. Big Data for Security Marco Casassa Mont Security and Manageability Lab Hewlett Packard Labs November 2015
  • 2. Transfer HPE Security SW Solution: DNS Malware Analytics 2
  • 3. The ArcSight Portfolio Intelligence Packages (Content) Connectors Logger ESM ArcMC Marketplace Analytics Intelligence Packages (Content) Connectors Logger ESM Management(ArcMC) Marketplace DNSMalware Analytics UserBehaviorAnalytics InteractiveDiscovery Analytics
  • 4. HPE Labs - Big Data for Security Overview 4
  • 5. Project overview – Helping organizations to detect new, unknown security threats by collecting, storing, analyzing, and visualizing massive amounts of security events – Use case: Domain Name Server (DNS): – Huge data logs (HPE IT pilot: 16-20B DNS packets/day) – Most malware uses DNS to communicate to command and control centers – Wide range of attacks from commoditized malware to advanced persistent threats (APTs) – Solution piloted with HPE IT worldwide and in 2 customers’ PoC – Ongoing technology transfer with HPE SW (product) and HPE Security Services (managed security service) 5 www.hpe.co m 16.110.135.51
  • 6. 6 Adapted from Lockheed Martin’s Cyber Kill Chain Research Infiltration Exfiltration Our enterprise Discovery Capture Their ecosyste m
  • 7. The security operations challenge Email Hotline/help desk call center Other IDS Triage Incident report Resolution Analyze Obtain contact information Provide technical assistance Coordinate Information and response Information request Vulnerability report Weeks -> ? Days Months CMU CERT/CC Incident Lifecycle
  • 8. Security operations research Email Hotline/help desk call center Other IDS Triage Incident report Resolution Analyze Obtain contact information Provide technical assistance Coordinate Information and response Information request Vulnerability report Early detection (Big Data) Rapid response (software-defined networking)
  • 9. What is DNS? Client / server Local DNS server DNS root “.” DNS.com DNS company.com Query: service.company.com? Check for zone Check cache REPLY: 58.25.88.90 DNS traffic generated by: - Users (e.g. by browsing web sites) - Applications, servers, etc.
  • 10. The scale of DNS data HPE IT operates ArcSight internally. Once fully deployed, it will be 25% larger than any other non- governmental installation by volume. DNS traffic per HPE data center: – 120,000 events/second – ~64B events/day globally 1 10 100 1000 10000 100000 1000000 Routers VPN McAfee ePO Active Directory Web Proxy DNS Eventspersecond(logarithmicscale) 0 20000 40000 60000 80000 100000 120000 140000 Routers VPN McAfee ePO Active Directory Web Proxy DNS Eventspersecond(linearscale)
  • 11. Abuse case Compromised server Victim Compromised DNS server www.hpe.com?1 12.34.56.782
  • 12. Abuse case Botnet command and control Bot DNS server akaajkajkajd.cn? xisyudnwuxu.ru? dfknwerpbnp.biz? mneyqslgyb.info? cspcicicipisjjew.hu? C2 Server (mneyqslgyb.info) Attacker can’t maintain C2 server at IP address for very long. So it registers a random domain name temporarily. Bot tries a bunch of random names until it finds one that resolves.
  • 13. AssetAsset Abuse case DNS tunneling (via subdomains) Bot DNS server (Compromised) DNS server (example.com) 93cc3daf.example.com4fac3215.example.coma86f4221.example.comddee9152.example.com8bd5ff12.example.comd4bb92a1.example.comef409132.example.com1bfa3207.example.com298c5b3a.example.com
  • 14. Solution architecture: Overview 14 DNS server(s) HPL DNS packet capture Whitelist network tap DNS queries and responses ArcSight Logger ArcSight ESM Blacklist Threat insight: HPL Security Analytics and Visualization Solution Event logging Correlation and alerting Real-time processing Near-time, historical analysis DNS events: queries and replies
  • 15. Event pre- processor Events Syslog Server Security analytical workflows Analytics scheduler Anomaly detection Threat indicators Visualization processing Web server 15 Security event logs Network systems HPL DNS Packet Capture Filtered DNS events ESM alerts Real-time analysis Historical analysis ESM Logger ESM GUI Alert manager HPELThreat Indicators&Anomaly DetectionLibrary HPE Labs Big Data Analytics Solution ArcSight Vertica Anomalies, threats, graphs
  • 17. More details about Security Analytics … 17
  • 18. Security analytics 18 Extended analytical framework to provide: 1. Analytics-based on Blacklisted DNS Events 2. Analytics-based on Random Domain Names (DGA domains). Tipping Point/DVLabs Collaboration 3. Analytics based on Data Exfiltration Security analytical workflows Analytics scheduler Anomaly Detection Threat Indicators Visualizatio n processing Web serverAlert manager HPLthreat Indicators&anomaly Detectionlibrary Threat insight: HPL big data analytics solution HP Vertica
  • 19. Analytics based on blacklisted events 19 1. Usage of TippingPoint RepDV 2. Client-based aggregations of high score, blacklisted domains 3. Detection of abnormal patterns: – Large percentage of queries (>50%) – Bad domain names queried for the first time – More than 5% towards same domain – …
  • 20. Analytics based on random generated domains (DGA) 1. Various techniques to detect DGA domains, including forbidden bigrams and classification (TippingPoint) 2. Client-based aggregations to identify infected devices 3. Detection of abnormal patterns: 1. High number of NXDOMAINS with a few resolving ones 2. High number of domains with similar classifications (Zeus, Virut, Conficker-AB,…)
  • 21. Analytics based on data exfiltration – Various techniques to detect domains used for DNS based Exfiltration and Tunneling – Client-based aggregations to identify infected devices – Detection of abnormal patterns: – Very long, odd looking, frequent domain names – Statistical analysis of domains to identify encoding
  • 22.
  • 24. Problem Areas and Opportunities HPE CONFIDENTIAL 24 1. Detection of serious, targeted attacks (including APTs) posing major risks to organisations 2. Remediation/Mitigation of Threats in timely manner • Collecting, processing and analysing huge, heterogeneous data sets • Limitation of current collection and computational models • Limitation of current security analytics and detection approaches • Use massive NV memory and computing power • Grounded security use cases, jointly with HP IT and customers 3. Innovate in the space of “Security Analytics for The Machine” • Localization of resources • Dynamic, virtualised environments • Very fragmented IT approaches • Lack of impact analysis
  • 25. Architectural Overview HPE CONFIDENTIAL 25 DNS Web proxy Network Traffic (SFlow …) IP-MAC- Hostname IT Infrastructure, Containers, The Machine Big Data Storage In-Memory Storage Threat Models Distributed Analytical Engines & Anomaly Detection Common Framework & APIs Tools & Visualizations Continuous/OnDemandData Collection&processing SDN NFV Instrumented Containers Traditional IT & SOC … Multiple Data Sources Next generation Analytical Engines & Threat Management Tools Remediation Engines & Workflows Remediation Mechanisms Programmable Data Collection User/DC/… Hybrid Storage Mgmt Analytic s Library Remediation Engines Remediation Workflows Impact Analysis
  • 26. Data Sources & Agents Kafka Cluster Storm Cluster HDFS Cluster Other Logging/ Brokering Mechanisms Vertica Cluster Spark HBASE+HIVE Elastic Search SQL Tools Analytical Framework & Engine Analytics Advanced Threat Detection Workflow & Tracking Models Visualization Remediation Processing Pipeline & Infrastructure
  • 27. Next Generation – HPE Labs’ Prototype Data Types DNS Web Proxy SFlow IP-MAC-Host DC/User Logs Firewall/VPN/… Data Abstraction Layer Attribute s Data processing Pipeline Event Buffering & Brokering (e.g. Kafka, …) Event Pre-processing & pre-Analytics (e.g. Storm, …) Analytic Engines Advanced Threat Detection: Workflow & Tracking Attribute s Attribute s Attribute s Attribute s Attribute s Library of Plug & Play Threat Analytic Modules Persistent Storage (e.g. Vertica, Hadoop, …) In Memory Storage (e.g. Regis, MongoDB, GraphX …) REST APIs REST APIs Library of Threat Models Visualization Data Exploration Web Services Threat Tracking Data and Evidence HPE CONFIDENTIAL 10
  • 29. Productisation 29 Screenshot from HPE DNS Malware Analytics – Cloud-based managed or self-service analytics with on-premises capture modules – Yearly subscription – Bolt-on upgrades – Events per second – Number of capture modules This is a rolling (up to 3-year) Roadmap and is subject to change without notice.
  • 30. Service architecture DNS Capture Module DNS analytics Alerts (infected system) Web-based detail and visual Drill-down Level 1 Analyst Hunt Team • Filter out 99% of traffic* • Tag events (blacklist matching, DGA detection) • Statistics and diagnostics • Constantly analyze DNS data for security threats • Alerting • Data visualization and exploration • SaaS/Cloud DNS Capture Module Enterprise SOC DNS server/cluster Analytics cloud * HPE CDC SIEM UI