SlideShare a Scribd company logo
1 of 55
THREAT INTELLIGENCE BASEADA EM
DADOS : MÉTRICAS DE DISSEMINAÇÃO
E COMPARTILHAMENTO DE
INDICADORES
Alexandre Sieira
Alex Pinto
• Cyber War… Threat Intel –
What is it good for?
• Combine and TIQ-test
• Measuring indicators
• Threat Intelligence Sharing
• Future research direction
(i.e. will work for data)
Agenda
HT to @RCISCwendy
50-ish Slides
3 Key Takeaways
2 Heartfelt and genuine defenses of Threat
Intelligence Providers
1 Prediction on “The Future of Threat
Intelligence Sharing”
Presentation Metrics!!
What is TI good for (1) Attribution
What is TI good for anyway?
TY to @bfist for his work on http://sony.attributed.to
What is TI good for (2) – Cyber Maps!!
TY to @hrbrmstr for his work on
https://github.com/hrbrmstr/pewpew
What is TI good for anyway?
• (3) How about actual defense?
• Strategic and tactical: planning
• Technical indicators: DFIR and monitoring
Affirming the Consequent Fallacy
1. If A, then B.
2. B.
3. Therefore, A.
1. Evil malware talks to 8.8.8.8.
2. I see traffic to 8.8.8.8.
3. ZOMG, APT!!!
But this is a Data-Driven talk!
Combine and TIQ-Test
• Combine (https://github.com/mlsecproject/combine)
• Gathers TI data (ip/host) from Internet and local files
• Normalizes the data and enriches it (AS / Geo / pDNS)
• Can export to CSV, “tiq-test format” and CRITs
• Coming Soon™: CybOX / STIX / SILK /ArcSight CEF
• TIQ-Test (https://github.com/mlsecproject/tiq-test)
• Runs statistical summaries and tests on TI feeds
• Generates charts based on the tests and summaries
• Written in R (because you should learn a stat language)
https://github.com/mlsecproject/tiq-test-Summer2015
Using TIQ-TEST – Feeds Selected
• Dataset was separated into “inbound” and “outbound”
TY to @kafeine and John Bambenek for access to their feeds
Using TIQ-TEST – Data Prep
• Extract the “raw” information from indicator feeds
• Both IP addresses and hostnames were extracted
Using TIQ-TEST – Data Prep
• Convert the hostname data to IP addresses:
• Active IP addresses for the respective date (“A” query)
• Passive DNS from Farsight Security (DNSDB)
• For each IP record (including the ones from hostnames):
• Add asnumber and asname (from MaxMind ASN DB)
• Add country (from MaxMind GeoLite DB)
• Add rhost (again from DNSDB) – most popular “PTR”
Using TIQ-TEST – Data Prep Done
Novelty Test
Measuring added and dropped
indicators
Novelty Test - Inbound
Aging Test
Is anyone cleaning this mess up
eventually?
INBOUND
OUTBOUND
Population Test
• Let us use the ASN and
GeoIP databases that we
used to enrich our data as a
reference of the “true”
population.
• But, but, human beings are
unpredictable! We will
never be able to forecast
this!
Is your sampling poll as random as
you think?
Can we get a better look?
• Statistical inference-based comparison models
(hypothesis testing)
• Exact binomial tests (when we have the “true” pop)
• Chi-squared proportion tests (similar to
independence tests)
Overlap Test
More data can be better, but make
sure it is not the same data
Overlap Test - Inbound
Overlap Test - Outbound
Uniqueness Test
Uniqueness Test
• “Domain-based indicators are unique to one list between 96.16% and
97.37%”
• “IP-based indicators are unique to one list between 82.46% and
95.24% of the time”
I hate quoting myself, but…
Key Takeaway #1
MORE != BETTER
Threat Intelligence
Indicator Feeds
Threat Intelligence
Program
Intermission
Key Takeaway #2
"These are the problems Threat
Intelligence Sharing is here to
solve!”
Right?
Herd Immunity, is it?
Source:
www.vaccines.gov
Herd Immunity…
… would imply that others in your sharing community being
immune to malware A meant you wouldn’t get it even if you were
still vulnerable to it.
Threat Intelligence Sharing
• How many indicators are being
shared?
• How many members do actually
share and how many just leech?
• Can we measure that? What a
super-deeee-duper idea!
Threat Intelligence Sharing
We would like to thank the kind contribution of data from the fine
folks at Facebook Threat Exchange and Threat Connect…
… and also the sharing communities that chose to remain
anonymous. You know who you are, and we ❤ you too.
Threat Intelligence Sharing – Data
From a period of 2015-03-01 to 2015-05-31:
- Number of Indicators Shared
 Per day
 Per member
Not sharing this data – privacy concerns for
the members and communities
MATURITY?
“Reddit of
Threat
Intelligence”?
'How can sharing make me
better understand what are
attacks that “are targeted” and
what are “commodity”?'
TELEMETRY > CONTENT
Key Takeaway #3
(Also Prediction #1)
More Takeaways (I lied)
• Analyze your data. Extract more value from it!
• If you ABSOLUTELY HAVE TO buy Threat Intelligence
or data, evaluate it first.
• Try the sample data, replicate the experiments:
• https://github.com/mlsecproject/tiq-test-Summer2015
• http://rpubs.com/alexcpsec/tiq-test-Summer2015
• Share data with us. I’ll make sure it gets proper exercise!
Alex Pinto
Chief Data Scientist
MLSec Project
@alexcpsec
@MLSecProject
Alexandre Sieira
CTO
Niddel
@AlexandreSieira
@NiddelCorp
”The measure of intelligence is the ability to change."
- Albert Einstein
OBRIGADO!

More Related Content

What's hot

Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approachchrissanders88
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationAlex Pinto
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingAlex Pinto
 
Detecting Trends Through Twitter Stream v2
Detecting Trends Through Twitter Stream v2Detecting Trends Through Twitter Stream v2
Detecting Trends Through Twitter Stream v2The Night's Watch
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityAlex Pinto
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesDaniel Billing
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Alex Pinto
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responsejeffmcjunkin
 
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...IIIT Hyderabad
 
A network based model for predicting a hashtag break out in twitter
A network based model for predicting a hashtag break out in twitter A network based model for predicting a hashtag break out in twitter
A network based model for predicting a hashtag break out in twitter Sultan Alzahrani
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Alexandre Sieira
 
NSA Tweets Rohit kumar
NSA Tweets Rohit kumarNSA Tweets Rohit kumar
NSA Tweets Rohit kumarRohit Kumar
 
MR201407 An example of antivirus detection rates and similarity of undetected...
MR201407 An example of antivirus detection rates and similarity of undetected...MR201407 An example of antivirus detection rates and similarity of undetected...
MR201407 An example of antivirus detection rates and similarity of undetected...FFRI, Inc.
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer GroupsGisli Olafsson
 
Data Science Poster Final
Data Science Poster FinalData Science Poster Final
Data Science Poster FinalJesse Hinson
 
Threat Modeling for Dummies
Threat Modeling for DummiesThreat Modeling for Dummies
Threat Modeling for DummiesAdam Englander
 
Crowd sourced intelligence built into search over hadoop
Crowd sourced intelligence built into search over hadoopCrowd sourced intelligence built into search over hadoop
Crowd sourced intelligence built into search over hadooplucenerevolution
 

What's hot (20)

Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
 
Detecting Trends Through Twitter Stream v2
Detecting Trends Through Twitter Stream v2Detecting Trends Through Twitter Stream v2
Detecting Trends Through Twitter Stream v2
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Enabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident responseEnabling effective hunt teaming and incident response
Enabling effective hunt teaming and incident response
 
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hu...
 
A network based model for predicting a hashtag break out in twitter
A network based model for predicting a hashtag break out in twitter A network based model for predicting a hashtag break out in twitter
A network based model for predicting a hashtag break out in twitter
 
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
Sharing is Caring: Medindo a Eficácia de Comunidades de Compartilhamento de T...
 
NSA Tweets Rohit kumar
NSA Tweets Rohit kumarNSA Tweets Rohit kumar
NSA Tweets Rohit kumar
 
MR201407 An example of antivirus detection rates and similarity of undetected...
MR201407 An example of antivirus detection rates and similarity of undetected...MR201407 An example of antivirus detection rates and similarity of undetected...
MR201407 An example of antivirus detection rates and similarity of undetected...
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer Groups
 
Data Science Poster Final
Data Science Poster FinalData Science Poster Final
Data Science Poster Final
 
Threat Modeling for Dummies
Threat Modeling for DummiesThreat Modeling for Dummies
Threat Modeling for Dummies
 
Crowd sourced intelligence built into search over hadoop
Crowd sourced intelligence built into search over hadoopCrowd sourced intelligence built into search over hadoop
Crowd sourced intelligence built into search over hadoop
 

Viewers also liked

BYOD: Bring Your Own... Disaster?
BYOD: Bring Your Own... Disaster?BYOD: Bring Your Own... Disaster?
BYOD: Bring Your Own... Disaster?Alexandre Sieira
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
19. Lead Management: far maturare i lead
19. Lead Management: far maturare i lead 19. Lead Management: far maturare i lead
19. Lead Management: far maturare i lead Manager.it
 
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...ATOR
 
JEG 091315 - TWD ProjectEpisode - Fight2
JEG 091315 - TWD ProjectEpisode - Fight2JEG 091315 - TWD ProjectEpisode - Fight2
JEG 091315 - TWD ProjectEpisode - Fight2Jacques Garcon
 
Instrumenting the Crowd + Task Fingerprinting Overview
Instrumenting the Crowd + Task Fingerprinting OverviewInstrumenting the Crowd + Task Fingerprinting Overview
Instrumenting the Crowd + Task Fingerprinting Overviewjeffrz
 
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...Банковское обозрение
 
5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills GapSirius
 
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...ATOR
 
12 месяцев года ОБЩИЕ ТЕНДЕНЦИИ 2010 года
12 месяцев года ОБЩИЕ  ТЕНДЕНЦИИ 2010 года12 месяцев года ОБЩИЕ  ТЕНДЕНЦИИ 2010 года
12 месяцев года ОБЩИЕ ТЕНДЕНЦИИ 2010 годаATOR
 
The Role of Design in Crowdsourcing
The Role of Design in CrowdsourcingThe Role of Design in Crowdsourcing
The Role of Design in CrowdsourcingCrowdsourcing Week
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceJason Trost
 
Ux & Marketing - Meetup Flupa Toulouse
Ux & Marketing - Meetup Flupa Toulouse Ux & Marketing - Meetup Flupa Toulouse
Ux & Marketing - Meetup Flupa Toulouse Maxime FRERE
 
I Mille volti della Nutrizione - Integrazione alimentare nelle patologie me...
I Mille volti della Nutrizione -   Integrazione alimentare nelle patologie me...I Mille volti della Nutrizione -   Integrazione alimentare nelle patologie me...
I Mille volti della Nutrizione - Integrazione alimentare nelle patologie me...Digital for Academy
 
12 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 201612 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 2016Tripwire
 
Strategy psys
Strategy psysStrategy psys
Strategy psysBankir_Ru
 

Viewers also liked (20)

BYOD: Bring Your Own... Disaster?
BYOD: Bring Your Own... Disaster?BYOD: Bring Your Own... Disaster?
BYOD: Bring Your Own... Disaster?
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
19. Lead Management: far maturare i lead
19. Lead Management: far maturare i lead 19. Lead Management: far maturare i lead
19. Lead Management: far maturare i lead
 
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июнь ...
 
Презентация: Вячеслав Семенихин
Презентация: Вячеслав СеменихинПрезентация: Вячеслав Семенихин
Презентация: Вячеслав Семенихин
 
JEG 091315 - TWD ProjectEpisode - Fight2
JEG 091315 - TWD ProjectEpisode - Fight2JEG 091315 - TWD ProjectEpisode - Fight2
JEG 091315 - TWD ProjectEpisode - Fight2
 
Hyde book 28-10-16
Hyde book 28-10-16Hyde book 28-10-16
Hyde book 28-10-16
 
Instrumenting the Crowd + Task Fingerprinting Overview
Instrumenting the Crowd + Task Fingerprinting OverviewInstrumenting the Crowd + Task Fingerprinting Overview
Instrumenting the Crowd + Task Fingerprinting Overview
 
300 PROMO DECK
300 PROMO DECK300 PROMO DECK
300 PROMO DECK
 
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...
Презентация Василия Кузнецова, SweetCard: «Таргетированные предложения скидок...
 
5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap5 Ways to Close Your Information Technology Skills Gap
5 Ways to Close Your Information Technology Skills Gap
 
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...
Анализ поисковых запросов в системе сравнения цен на туры Слетать.ру за июль ...
 
Curiculum Vitae (CV)
Curiculum Vitae (CV)Curiculum Vitae (CV)
Curiculum Vitae (CV)
 
12 месяцев года ОБЩИЕ ТЕНДЕНЦИИ 2010 года
12 месяцев года ОБЩИЕ  ТЕНДЕНЦИИ 2010 года12 месяцев года ОБЩИЕ  ТЕНДЕНЦИИ 2010 года
12 месяцев года ОБЩИЕ ТЕНДЕНЦИИ 2010 года
 
The Role of Design in Crowdsourcing
The Role of Design in CrowdsourcingThe Role of Design in Crowdsourcing
The Role of Design in Crowdsourcing
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
Ux & Marketing - Meetup Flupa Toulouse
Ux & Marketing - Meetup Flupa Toulouse Ux & Marketing - Meetup Flupa Toulouse
Ux & Marketing - Meetup Flupa Toulouse
 
I Mille volti della Nutrizione - Integrazione alimentare nelle patologie me...
I Mille volti della Nutrizione -   Integrazione alimentare nelle patologie me...I Mille volti della Nutrizione -   Integrazione alimentare nelle patologie me...
I Mille volti della Nutrizione - Integrazione alimentare nelle patologie me...
 
12 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 201612 Top Talks from BSides San Francisco 2016
12 Top Talks from BSides San Francisco 2016
 
Strategy psys
Strategy psysStrategy psys
Strategy psys
 

Similar to Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilhamento de Indicadores

Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Alex Pinto
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiJeremy Li
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Harry McLaren
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric SecurityNed Hayes
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everythingRyan Kovar
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackAlistair Gillespie
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science TJ Stalcup
 
Fairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInFairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInC4Media
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Alex Pinto
 
SuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalSuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalstelligence
 
IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!Priyanka Aash
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Chi En (Ashley) Shen
 

Similar to Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilhamento de Indicadores (20)

Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy Li
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science Thinkful DC - Intro to Data Science
Thinkful DC - Intro to Data Science
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Fairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedInFairness, Transparency, and Privacy in AI @LinkedIn
Fairness, Transparency, and Privacy in AI @LinkedIn
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
 
SuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalSuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-final
 
IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
 

Recently uploaded

Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 

Recently uploaded (20)

Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 

Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilhamento de Indicadores

  • 1. THREAT INTELLIGENCE BASEADA EM DADOS : MÉTRICAS DE DISSEMINAÇÃO E COMPARTILHAMENTO DE INDICADORES Alexandre Sieira Alex Pinto
  • 2. • Cyber War… Threat Intel – What is it good for? • Combine and TIQ-test • Measuring indicators • Threat Intelligence Sharing • Future research direction (i.e. will work for data) Agenda HT to @RCISCwendy
  • 3. 50-ish Slides 3 Key Takeaways 2 Heartfelt and genuine defenses of Threat Intelligence Providers 1 Prediction on “The Future of Threat Intelligence Sharing” Presentation Metrics!!
  • 4. What is TI good for (1) Attribution
  • 5. What is TI good for anyway? TY to @bfist for his work on http://sony.attributed.to
  • 6. What is TI good for (2) – Cyber Maps!! TY to @hrbrmstr for his work on https://github.com/hrbrmstr/pewpew
  • 7. What is TI good for anyway? • (3) How about actual defense? • Strategic and tactical: planning • Technical indicators: DFIR and monitoring
  • 8. Affirming the Consequent Fallacy 1. If A, then B. 2. B. 3. Therefore, A. 1. Evil malware talks to 8.8.8.8. 2. I see traffic to 8.8.8.8. 3. ZOMG, APT!!!
  • 9. But this is a Data-Driven talk!
  • 10. Combine and TIQ-Test • Combine (https://github.com/mlsecproject/combine) • Gathers TI data (ip/host) from Internet and local files • Normalizes the data and enriches it (AS / Geo / pDNS) • Can export to CSV, “tiq-test format” and CRITs • Coming Soon™: CybOX / STIX / SILK /ArcSight CEF • TIQ-Test (https://github.com/mlsecproject/tiq-test) • Runs statistical summaries and tests on TI feeds • Generates charts based on the tests and summaries • Written in R (because you should learn a stat language)
  • 12. Using TIQ-TEST – Feeds Selected • Dataset was separated into “inbound” and “outbound” TY to @kafeine and John Bambenek for access to their feeds
  • 13. Using TIQ-TEST – Data Prep • Extract the “raw” information from indicator feeds • Both IP addresses and hostnames were extracted
  • 14. Using TIQ-TEST – Data Prep • Convert the hostname data to IP addresses: • Active IP addresses for the respective date (“A” query) • Passive DNS from Farsight Security (DNSDB) • For each IP record (including the ones from hostnames): • Add asnumber and asname (from MaxMind ASN DB) • Add country (from MaxMind GeoLite DB) • Add rhost (again from DNSDB) – most popular “PTR”
  • 15. Using TIQ-TEST – Data Prep Done
  • 16. Novelty Test Measuring added and dropped indicators
  • 17. Novelty Test - Inbound
  • 18. Aging Test Is anyone cleaning this mess up eventually?
  • 21. Population Test • Let us use the ASN and GeoIP databases that we used to enrich our data as a reference of the “true” population. • But, but, human beings are unpredictable! We will never be able to forecast this!
  • 22.
  • 23. Is your sampling poll as random as you think?
  • 24. Can we get a better look? • Statistical inference-based comparison models (hypothesis testing) • Exact binomial tests (when we have the “true” pop) • Chi-squared proportion tests (similar to independence tests)
  • 25.
  • 26. Overlap Test More data can be better, but make sure it is not the same data
  • 27. Overlap Test - Inbound
  • 28. Overlap Test - Outbound
  • 30. Uniqueness Test • “Domain-based indicators are unique to one list between 96.16% and 97.37%” • “IP-based indicators are unique to one list between 82.46% and 95.24% of the time”
  • 31.
  • 32. I hate quoting myself, but…
  • 33. Key Takeaway #1 MORE != BETTER Threat Intelligence Indicator Feeds Threat Intelligence Program
  • 35.
  • 37. "These are the problems Threat Intelligence Sharing is here to solve!” Right?
  • 38. Herd Immunity, is it? Source: www.vaccines.gov
  • 39. Herd Immunity… … would imply that others in your sharing community being immune to malware A meant you wouldn’t get it even if you were still vulnerable to it.
  • 40. Threat Intelligence Sharing • How many indicators are being shared? • How many members do actually share and how many just leech? • Can we measure that? What a super-deeee-duper idea!
  • 41. Threat Intelligence Sharing We would like to thank the kind contribution of data from the fine folks at Facebook Threat Exchange and Threat Connect… … and also the sharing communities that chose to remain anonymous. You know who you are, and we ❤ you too.
  • 42. Threat Intelligence Sharing – Data From a period of 2015-03-01 to 2015-05-31: - Number of Indicators Shared  Per day  Per member Not sharing this data – privacy concerns for the members and communities
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 51.
  • 52. 'How can sharing make me better understand what are attacks that “are targeted” and what are “commodity”?'
  • 53. TELEMETRY > CONTENT Key Takeaway #3 (Also Prediction #1)
  • 54. More Takeaways (I lied) • Analyze your data. Extract more value from it! • If you ABSOLUTELY HAVE TO buy Threat Intelligence or data, evaluate it first. • Try the sample data, replicate the experiments: • https://github.com/mlsecproject/tiq-test-Summer2015 • http://rpubs.com/alexcpsec/tiq-test-Summer2015 • Share data with us. I’ll make sure it gets proper exercise!
  • 55. Alex Pinto Chief Data Scientist MLSec Project @alexcpsec @MLSecProject Alexandre Sieira CTO Niddel @AlexandreSieira @NiddelCorp ”The measure of intelligence is the ability to change." - Albert Einstein OBRIGADO!

Editor's Notes

  1. During this presentation I’ll be making a quick introduction on some important concepts and our views on what threat intelligence is and the many useful things that can and cannot be done with it. Then, Mr. Pinto will present a couple of open source tools made available at the MLSec Project GitHub repository and an analysis of the metrics we gathered from a set of publicly available and private threat intelligence feeds.
  2. During this presentation I’ll be making a quick introduction on some important concepts and our views on what threat intelligence is and the many useful things that can and cannot be done with it. Then, Mr. Pinto will present a couple of open source tools made available at the MLSec Project GitHub repository and an analysis of the metrics we gathered from a set of publicly available and private threat intelligence feeds.
  3. Based on what you read on the media and one some online marketing material, attribution is one of the sexiest parts about threat intelligence. If you understand your adversaries, their intent and capabilities, there is a lot you can do within your risk management and even business decisions to better prepare yourself. However, if you want to be realistic you’ll have to admit that as in the case demonstrated here, attribution is really hard to do. This reflects both on the cost of of getting good CTI data with attribution. Also it is not reasonable to expect that any significant proportion of attacks out there will be attributed at all, given the sheer amount of smaller threat actors out there.
  4. This is beautifully illustrated by the Sony breach controversy. So data science to the rescue! The good humored sony.attributed.to website creates plausible attribution reports for the Sony hack. It is based on data sampled from actual attacks data in the VERIS and DBIR databases consistent with how frequently threat actors, locations and methods are actually used.
  5. One other really common application of threat intelligence is building a threat map. After all, how else will upper management know that your team really has what it takes to prevent pandas, bears and even maybe capybaras from infiltrating your networks? Who knows what those samba-dancing Brazilian hackers are up to, after all? Fear not, now there’s an open source threat map that you can use called Pew pew. And you don’t even need to stand up your own honeypots. Pew pew displays plausible attack patterns that are sampled randomly from public data made available by Arbor Networks. So it is exactly as useful as the real thing.
  6. But seriously, what about using the threat intelligence data to actually defend organizations? The high level data is awesome to help with the high level decisions, of course. However, how do you go about using the technical indicators? It’s straightforward enough to pull a list of IP addresses, domain names and URLs into SIEMs or IDS rules. As Gavin Reid mentioned in his talk yesterday, this can be a great way to reduce the time it takes to detect a novel threat and bypass the detection, rule writing and policy update cycle of your sensors. However, this has to be done with great care.
  7. Threat intelligence feeds are mostly providing indicators of things that malware does: for example IP addresses, domain names and URLs they communicate with. Knowing this can be invaluable for all sorts of investigation and forensics activities. But we really believe the holy grail is detection. A breach detection example the fallacy: some malware observed talking to a destination does NOT mean that all communication towards that destination is indicative of malware. Also you need evaluate the quality and the applicability of the indicators you are consuming (and perhaps paying for) to decide which combination of sources is optimal for your organization. Now Mr. Pinto will tell you a bit about two open source projects we develop to help you perform such an evaluation.
  8. 2014 was not a leap year 150k outbound 300k inbound 450k X 365 -> 164,250,000 / 165 MILLION
  9. 28 feeds
  10. - For the hostname / domains feeds: - We extracted the "active" IP addresses for those hostnames on the dates they were reported (using pDNS from Farsight Security) - Passive DNS query of active "A" responses on the reported day (from 00:00 to 23:59) - For this experiment, we got rid of "non-public IPs" (localhost, RFC1918) - Then for each IP record (including the ones got above) enrich it with: - asnumber and asname (from MaxMind ASN DB) - country (from MaxMind GeoLite DB) - rhost - the more popular reverse DNS entry ("PTR") from passive DNS on that date
  11. - Then for each IP record (including the ones got above) enrich it with: - asnumber and asname (from MaxMind ASN DB) - country (from MaxMind GeoLite DB) - rhost - the more popular reverse DNS entry ("PTR") from passive DNS on that date - we are not playing around with this on this talk, data is too sparse
  12. NOVELTY: Always request a trial of the data feed (15/30 days) Measure addition and churn
  13. OVERLAP
  14. OVERLAP
  15. OVERLAP
  16. POPULATION: We will use the ASN and GEO databases as our population - They should cover all the existing IPv4 space, give or take a few anomalies With this, we can simulate a draw from this population for people that are going to be attacking us because human beings are unpredictable and will never be able to forecast where the attacks are coming from right? :troll: ----- COUNTRY / ASN (graphs of country proportions on different feeds)
  17. Inbound – Turkey WINS! US is highly above the population average, and CN is slightly below
  18. ---- HYPOTHESIS TESTING OF PROPORTIONS (explain exact binom test vs. Chi-squared)
  19. ---- HYPOTHESIS TESTING OF PROPORTIONS (explain exact binom test vs. Chi-squared)
  20. -> Explain the diferences - These differences describe a higher probability of specific actors targeting you from specific locations (GEO/ASN) in relation to a completely random actor. - Was one of the 1st features I used for MLSec
  21. Get 100 fish in a pond Tag all Get 100 more fish – how many were tagged? 5?-> 20x more fish
  22. Intermission
  23. LARGE is 36x bigger than SMALL
  24. Could we be in a sharing community and not have paid feeds?