SlideShare a Scribd company logo
Threat Intelligence Ops In-Depth
at Massive Enterprise
Jeremy Li – Information Security Dept. of Meituan Inc.
Intro
• Id: e1knot
• System Infrastructure Security Team of Meituan Inc.
• Systems of Threat Intelligence and Security Awareness Capabilities
• 4-Year+ Threat Intelligence Analytic and Operation Experience
• Speakers at ISC2017, DEFCON China, etc.
Agenda
• Threat Types of Systems in Massive Enterprise
• Threat Intelligence Capability Building
• Evaluate Threat Intelligence Capability
• Life-Cycle, Systems and Operation of Threat Intelligence
• Coda
Threat Types at Systems in Massive Enterprise
• Massive Business Data: 1B+ Page Views in Core Systems
• Large Business Scale: 1M+ Apps in Systems, 100M+ Lines in Code Repo
• Massive Assets: 1M+ Endpoints, IDC Servers, Software
• Massive Assets Types: 100K+ Types of Middle-Wares and Components
• Massive Alerts: 10K+ Alarms from Different Security Assets
• Situation of Enterprise Security: Incidents with Massive Security Cost
Threat Types at Systems in Massive Enterprise
Components
Vuls
Trojan,
Worm,
Botnets
Configs
Corruption
X-Day
Vuls
System Vuls
Logic Vuls
Credentials
Leaked
ACLs Invalid
POI/UGC
Spider
Employee
Compromise
Cheats
App Tamper
Infrastructure System Business System Business Data Grids
Threat Intelligence Capability Building
• Solutions can solve your security
problems?
• Threat Intelligence running well
on your Security Infrastructure?
• Threat Intelligence Groups
OKRs/KPIs?
Hurts of Threat Intelligence Operation
Fake
Intelligence
Information
Asymmetry
Useless
Intelligence
Information
Lag
Threat Intelligence Capability Building
Roles of Threat Intelligence in Enterprise Security?
Threat -> TI -> TI Capability
Ability to provide effective and reliable message type or knowledge type data for discovering
potential or emerging threats (including but not limited to business data, systems and infrastructure),
and the data can be highly automated closed-loop processing capability through secure operations For
threat intelligence capabilities, the data provided is called threat intelligence.
—— A Horizon
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators,
implications and actionable advice, about an existing or emerging menace or hazard to assets that can
be used to inform decisions regarding the subject's response to that menace or hazard.
—— Gartner(2013)
Evaluate Threat Intelligence Capability
Low
Latency
High
Accuracy
Full
Operated
Closed-
Loop
• Intelligence
Synchronized asap
• Intelligence Full-
Operated &
Automation Rate
• Intelligence Data
Grids/Channels
Reliable, Confidence,
Integrity
• High Accuracy
Algorithm
• FINTELs Quality
• Providing Instructions
& Functions
• Compatible Methods
for Intelligence Ops
• TODOs & Cases Study
• Improve FINTELs
Quality
FINTEL is for Final Intelligence
Evaluate Threat Intelligence Capability
Data Grids Production Platforms Operators
Threat Intelligence Components
Threat Intelligence Architecture Building
• 1- Arch:A Threat Intelligence Architecture Compatible with Existing Security System
• 2- Platforms:Notification Platform(MT-Radar) & Management Platform(MT-Nebula)
• 3- Data Grids:Internet Assets Signatures, Vulnerabilities Database, OSINTs
• 4- Channels:HUMINT, Auto-Gathering, 3rd-Party Services, Security Response Center
Intelligence Required!
Threat Intelligence Operation Life-Cycle
Intelligence Proposal
•Evaluation
Methods
•Ops Strategy
•Continuity Ops
•Access
Requirements
•Output Methods
Intelligence
Gathering & Analytic
•Data Integrity
•Intelligence
Modeling
•FINTEL
Requirement
•Adjustments &
Refinements
•ML?
Intelligence Delivery
& Operation
•Closed-Loop
Method
•Ops Data
Collection
•Valid FINTELs
•Standard
•Alarms Interactive
Cases Study &
TODOs
•FINTEL Quality
•Problems
Solutions
•Security Special
Items
•DevSecOps
Refinement
Threat Intelligence Arch Capability Matrix
TIMC is short for Threat Intelligence Management Center.
Internal
Data
IOC
Black
Channel
Vuls Info OSINTData Grids
Internal Log Sets Threat Intelligence Processing/Aggregation/ProductionProcess
Analytic TI Production Algorithm FINTEL Refinements Adjustment Weight
Operation TI Cases Study
Delivery &
Notification
TI Open Capability Platform
Threats Demands and
Analytics
Data Grids Demands and
Analytics
Response and Closed-
Loop MethodsTI Plans
APIs
MT-Radar
Issue Tickets
TIMC
(MT-Nebula)
HUMINT
Operations
Net-
Disk/GitHub
PDNS
Threat Intelligence Gathering & Analytic
OSINT
(Include IOC)
NetDisk/GitHub/
Pastebin
Black Information
Sharing Channel
HUMINT/SRC
Pre-Processing
Key Information
Gathering
Intelligence
Recognition
FINTEL
Refinement
FINTEL Delivery
Pre-Processing TI Data Grids FINTEL Refinements & Optimized Operation
TI Consume
Incident Response
& Recovery
Threat Intelligence Production Model
Real-Time
Compute
Offline
Compute
NLP/OCR
ML
MQ
TI Production Rules Refinements
Datasets
Hybridization
Threat Intelligence Gathering & Analytic
• Threat Intelligence Data Grids Contain Network Signature/OSINT DB/Black
Trades Channels
• Fetch Intelligence Entities from Intelligence Data Grids in Using
ML/NLP/OCR
• Optimize & Refine FINTELs for Security Operation
• FINTEL Must be Checked by 3rd Teams for Making Sure of Availability &
Loop-Cycled
Threat Intelligence Operation & Delivery
• FINTEL Delivery Rules:
– Highly Readable Contents
– Full Elements for Assessment
– Solutions Provided
– Affections Contained!
– Instructions for Operation
Threat Intelligence Notifications & Responses
Threat
Intelligence
Assets
Management
Code Audit
IDS/IDP
Security
Awareness
WAF/FirewallRisks Management SOC
EDR
THANK YOU
2019.8.20

More Related Content

What's hot

Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
Infocyte
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
DNIF
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
Carl C. Manion
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
n|u - The Open Security Community
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Santiago Bassett
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
Ben Boyd
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
JacklynTsai
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
Sarah Chandley
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
Lionel Faleiro
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
InfoSec Addicts
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
Jason Trost
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
Benjamin D. Brooks, CISSP
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
Anton Chuvakin
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Danny Akacki
 

What's hot (20)

Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 

Similar to Threat Intelligence Ops In-Depth at Massive Enterprise

Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy1
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
BAINIDA
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
Netpluz Asia Pte Ltd
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Cloudera, Inc.
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
Asaf Nakash
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
Chris Sistrunk
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
RedZone Technologies
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
Fully Integrated Defense Operation
Fully Integrated Defense OperationFully Integrated Defense Operation
Fully Integrated Defense Operation
Rob Fry
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
Splunk
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
Harry McLaren
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
ShivamSharma909
 

Similar to Threat Intelligence Ops In-Depth at Massive Enterprise (20)

Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Fully Integrated Defense Operation
Fully Integrated Defense OperationFully Integrated Defense Operation
Fully Integrated Defense Operation
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 

Recently uploaded

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
Poornima D
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
CE19KaushlendraKumar
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 

Recently uploaded (20)

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 

Threat Intelligence Ops In-Depth at Massive Enterprise

  • 1. Threat Intelligence Ops In-Depth at Massive Enterprise Jeremy Li – Information Security Dept. of Meituan Inc.
  • 2. Intro • Id: e1knot • System Infrastructure Security Team of Meituan Inc. • Systems of Threat Intelligence and Security Awareness Capabilities • 4-Year+ Threat Intelligence Analytic and Operation Experience • Speakers at ISC2017, DEFCON China, etc.
  • 3. Agenda • Threat Types of Systems in Massive Enterprise • Threat Intelligence Capability Building • Evaluate Threat Intelligence Capability • Life-Cycle, Systems and Operation of Threat Intelligence • Coda
  • 4. Threat Types at Systems in Massive Enterprise • Massive Business Data: 1B+ Page Views in Core Systems • Large Business Scale: 1M+ Apps in Systems, 100M+ Lines in Code Repo • Massive Assets: 1M+ Endpoints, IDC Servers, Software • Massive Assets Types: 100K+ Types of Middle-Wares and Components • Massive Alerts: 10K+ Alarms from Different Security Assets • Situation of Enterprise Security: Incidents with Massive Security Cost
  • 5. Threat Types at Systems in Massive Enterprise Components Vuls Trojan, Worm, Botnets Configs Corruption X-Day Vuls System Vuls Logic Vuls Credentials Leaked ACLs Invalid POI/UGC Spider Employee Compromise Cheats App Tamper Infrastructure System Business System Business Data Grids
  • 6. Threat Intelligence Capability Building • Solutions can solve your security problems? • Threat Intelligence running well on your Security Infrastructure? • Threat Intelligence Groups OKRs/KPIs?
  • 7. Hurts of Threat Intelligence Operation Fake Intelligence Information Asymmetry Useless Intelligence Information Lag
  • 8. Threat Intelligence Capability Building Roles of Threat Intelligence in Enterprise Security?
  • 9. Threat -> TI -> TI Capability Ability to provide effective and reliable message type or knowledge type data for discovering potential or emerging threats (including but not limited to business data, systems and infrastructure), and the data can be highly automated closed-loop processing capability through secure operations For threat intelligence capabilities, the data provided is called threat intelligence. —— A Horizon Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard. —— Gartner(2013)
  • 10. Evaluate Threat Intelligence Capability Low Latency High Accuracy Full Operated Closed- Loop • Intelligence Synchronized asap • Intelligence Full- Operated & Automation Rate • Intelligence Data Grids/Channels Reliable, Confidence, Integrity • High Accuracy Algorithm • FINTELs Quality • Providing Instructions & Functions • Compatible Methods for Intelligence Ops • TODOs & Cases Study • Improve FINTELs Quality FINTEL is for Final Intelligence
  • 11. Evaluate Threat Intelligence Capability Data Grids Production Platforms Operators Threat Intelligence Components
  • 12. Threat Intelligence Architecture Building • 1- Arch:A Threat Intelligence Architecture Compatible with Existing Security System • 2- Platforms:Notification Platform(MT-Radar) & Management Platform(MT-Nebula) • 3- Data Grids:Internet Assets Signatures, Vulnerabilities Database, OSINTs • 4- Channels:HUMINT, Auto-Gathering, 3rd-Party Services, Security Response Center Intelligence Required!
  • 13. Threat Intelligence Operation Life-Cycle Intelligence Proposal •Evaluation Methods •Ops Strategy •Continuity Ops •Access Requirements •Output Methods Intelligence Gathering & Analytic •Data Integrity •Intelligence Modeling •FINTEL Requirement •Adjustments & Refinements •ML? Intelligence Delivery & Operation •Closed-Loop Method •Ops Data Collection •Valid FINTELs •Standard •Alarms Interactive Cases Study & TODOs •FINTEL Quality •Problems Solutions •Security Special Items •DevSecOps Refinement
  • 14. Threat Intelligence Arch Capability Matrix TIMC is short for Threat Intelligence Management Center. Internal Data IOC Black Channel Vuls Info OSINTData Grids Internal Log Sets Threat Intelligence Processing/Aggregation/ProductionProcess Analytic TI Production Algorithm FINTEL Refinements Adjustment Weight Operation TI Cases Study Delivery & Notification TI Open Capability Platform Threats Demands and Analytics Data Grids Demands and Analytics Response and Closed- Loop MethodsTI Plans APIs MT-Radar Issue Tickets TIMC (MT-Nebula) HUMINT Operations Net- Disk/GitHub PDNS
  • 15. Threat Intelligence Gathering & Analytic OSINT (Include IOC) NetDisk/GitHub/ Pastebin Black Information Sharing Channel HUMINT/SRC Pre-Processing Key Information Gathering Intelligence Recognition FINTEL Refinement FINTEL Delivery Pre-Processing TI Data Grids FINTEL Refinements & Optimized Operation TI Consume Incident Response & Recovery Threat Intelligence Production Model Real-Time Compute Offline Compute NLP/OCR ML MQ TI Production Rules Refinements Datasets Hybridization
  • 16. Threat Intelligence Gathering & Analytic • Threat Intelligence Data Grids Contain Network Signature/OSINT DB/Black Trades Channels • Fetch Intelligence Entities from Intelligence Data Grids in Using ML/NLP/OCR • Optimize & Refine FINTELs for Security Operation • FINTEL Must be Checked by 3rd Teams for Making Sure of Availability & Loop-Cycled
  • 17. Threat Intelligence Operation & Delivery • FINTEL Delivery Rules: – Highly Readable Contents – Full Elements for Assessment – Solutions Provided – Affections Contained! – Instructions for Operation
  • 18. Threat Intelligence Notifications & Responses Threat Intelligence Assets Management Code Audit IDS/IDP Security Awareness WAF/FirewallRisks Management SOC EDR