SlideShare a Scribd company logo
Threat
Intelligence +
Security
Monitoring
By : Talha Riaz(AESRG lab)
Benefits from Others Misfortune
 Cant Get Ahead of Threat
 Threat Already Exists
 Idea is to Know at as Early as Possible
Shortening The Window
 TI Help to Detect Attacks Earlier
Threat Intelligence Sources
 Compromised Devices
 Malware Indicators
 Reputation
 Command and Control Networks
Compromised Devices
 Device Communication
Malware Indicators
 Malware Analysis
 Technical Behavioral Indicator
 What is Does v/s What it looks like
Reputation
 Dynamic List of IP Addresses
 Score System
Challenges of Using TI for SM
 Integration of Data
 Update rules/alerts/reports
 Validation
Revisiting Security Monitoring
 Phase 1: Plan
 Phase 2: Monitor
 Phase 3: Action
Phase : Plan
 Enumerate
 Find Security, Network and server Devices
 Scope
 Decide which devices are in Scope for Monitoring
 Develop Policies
 Organizational Policies (which Devices will be
monitored and Why)
 Device & Alerting Policies (Which data will be
collected and how often)
Phase 2: Monitor
 Collect
 Collect alerts and log records based on the
policies defined in the Plan phase.
 Store
 Collected data must be stored for future access,
for both compliance and forensics.
 Analyze
 The collected data is analyzed to identify potential
incidents based on alerting policies defined in
phase 1.
Phase 3: Action
 Validate/Investigate
 Action/Escalate
After validating a few alerts you can determine whether
policies must be changed or tuned. Tuning policies must be
a recurring feedback loop rather than a one-time activity
What has Changed..!
Now a days monitoring only for well-
defined static attacks will get you
killed. Tactics change frequently
and malware changes daily.
TI + SM
o As you integrate threat intelligence into your
security
o Monitoring (SM) process, you can generate
more accurate
o Alerts from your security monitoring platform,
lowering
o The signal to noise ratio because the alerts are
based on what is actually happening in the
wild.
The New SM Process
 Threat Intelligence Integrated with
Security Monitoring
Gather Threat Intelligence
 Profile Adversaries
 Who is more Likely to attack you so you can profile
their Tactics, Techniques, and Procedures.
 Gather Samples
 Gather Large amount of data to analyze and
define indicators
 Analyze Data and Distill Threats Intelligence
 After Data aggregation define patterns and
Indicators seen in the wild.
Aggregate Security Data
 Same as Simple Security Monitoring
Security Analytics
 Automate TI Integration
 Baseline Environment
 Analyze Security Data (N,C,R,T)
 Alert
 Prioritize Alerts
 Deep Collection for forensics
Action
 Same as Simple Security Monitoring

More Related Content

What's hot

Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
Cisco Canada
 
Assessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber AttacksAssessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber Attacks
Cimation
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
EMC
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
netmonastery
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
Chad Loeven
 
SecPod Saner
SecPod SanerSecPod Saner
SecPod Saner
Chandrashekhar B
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
Carl B. Forkner, Ph.D.
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Approaches to integrated malware detection and avoidance
Approaches to integrated malware detection and avoidanceApproaches to integrated malware detection and avoidance
Approaches to integrated malware detection and avoidance
UltraUploader
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEEMEMTECHSTUDENTPROJECTS
 
Ch19
Ch19Ch19
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
Ixia
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
Gregory Hanis
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
Ashley Deuble
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
CTAP
CTAPCTAP
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 

What's hot (19)

Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
 
Assessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber AttacksAssessment and Threats: Protecting Your Company from Cyber Attacks
Assessment and Threats: Protecting Your Company from Cyber Attacks
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
 
SecPod Saner
SecPod SanerSecPod Saner
SecPod Saner
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Approaches to integrated malware detection and avoidance
Approaches to integrated malware detection and avoidanceApproaches to integrated malware detection and avoidance
Approaches to integrated malware detection and avoidance
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
 
Ch19
Ch19Ch19
Ch19
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
CTAP
CTAPCTAP
CTAP
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 

Viewers also liked

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
RajKumar Rampelli
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network security
Network securityNetwork security
Network security
Gichelle Amon
 

Viewers also liked (6)

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Network security
Network security Network security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 

Similar to Threat Intelligence + Secuirity Monitoring

Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
Sarah Chandley
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
Editor IJMTER
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
International Journal of Technical Research & Application
 
Kb2417221726
Kb2417221726Kb2417221726
Kb2417221726
IJERA Editor
 
Cybersecurity
CybersecurityCybersecurity
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
EMC
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
 
Ids 014 anomaly detection
Ids 014 anomaly detectionIds 014 anomaly detection
Ids 014 anomaly detection
jyoti_lakhani
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
Frédéric Sagez
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Falgun Rathod
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
Darren Pauli
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
EMMAIntl
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
Lumension
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
OWASP Delhi
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
Ankit Gupta
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
VinayPratap58
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 

Similar to Threat Intelligence + Secuirity Monitoring (20)

Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
 
Kb2417221726
Kb2417221726Kb2417221726
Kb2417221726
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Ids 014 anomaly detection
Ids 014 anomaly detectionIds 014 anomaly detection
Ids 014 anomaly detection
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 

Threat Intelligence + Secuirity Monitoring

  • 2. Benefits from Others Misfortune  Cant Get Ahead of Threat  Threat Already Exists  Idea is to Know at as Early as Possible
  • 3. Shortening The Window  TI Help to Detect Attacks Earlier
  • 4. Threat Intelligence Sources  Compromised Devices  Malware Indicators  Reputation  Command and Control Networks
  • 6. Malware Indicators  Malware Analysis  Technical Behavioral Indicator  What is Does v/s What it looks like
  • 7. Reputation  Dynamic List of IP Addresses  Score System
  • 8. Challenges of Using TI for SM  Integration of Data  Update rules/alerts/reports  Validation
  • 9. Revisiting Security Monitoring  Phase 1: Plan  Phase 2: Monitor  Phase 3: Action
  • 10.
  • 11. Phase : Plan  Enumerate  Find Security, Network and server Devices  Scope  Decide which devices are in Scope for Monitoring  Develop Policies  Organizational Policies (which Devices will be monitored and Why)  Device & Alerting Policies (Which data will be collected and how often)
  • 12. Phase 2: Monitor  Collect  Collect alerts and log records based on the policies defined in the Plan phase.  Store  Collected data must be stored for future access, for both compliance and forensics.  Analyze  The collected data is analyzed to identify potential incidents based on alerting policies defined in phase 1.
  • 13. Phase 3: Action  Validate/Investigate  Action/Escalate After validating a few alerts you can determine whether policies must be changed or tuned. Tuning policies must be a recurring feedback loop rather than a one-time activity
  • 14. What has Changed..! Now a days monitoring only for well- defined static attacks will get you killed. Tactics change frequently and malware changes daily.
  • 15. TI + SM o As you integrate threat intelligence into your security o Monitoring (SM) process, you can generate more accurate o Alerts from your security monitoring platform, lowering o The signal to noise ratio because the alerts are based on what is actually happening in the wild.
  • 16. The New SM Process  Threat Intelligence Integrated with Security Monitoring
  • 17.
  • 18. Gather Threat Intelligence  Profile Adversaries  Who is more Likely to attack you so you can profile their Tactics, Techniques, and Procedures.  Gather Samples  Gather Large amount of data to analyze and define indicators  Analyze Data and Distill Threats Intelligence  After Data aggregation define patterns and Indicators seen in the wild.
  • 19. Aggregate Security Data  Same as Simple Security Monitoring
  • 20. Security Analytics  Automate TI Integration  Baseline Environment  Analyze Security Data (N,C,R,T)  Alert  Prioritize Alerts  Deep Collection for forensics
  • 21. Action  Same as Simple Security Monitoring