SlideShare a Scribd company logo
1 of 30
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
MATATABI : Cyber Threat
Analysis and Defense Platform
using Huge Amount of Datasets
Yuji Sekiya*
*The University of Tokyo, Japan
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Multi-layer Threat Analysis
Victim side action
Filtering
Load balancing
Isolation
Countermeasure for Attackers
Report to ISP
Announce to users
Filtering at ISP level
Configuration to servers
Data collection at
Multiple layers/locations
Network device
Servers
Users Device
Analysis Platform
Analysis 1
Analysis 2
Analysis 3
Threat analysis (detection) across
multiple datasources
Threat Information Share
Among organizations
Announce to public
2
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Security Information Pipeline
 Making pipeline through divert activities
 Data collection (Traffic, User behavior, etc)
 Threat Analysis
 Human decision
 Protection (Enforcement)
ProtectionData Analysis
Human
Inputs
3
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Datasets
4
MATATABI
Switch
Router
DNS
Firewall
SPAM
Phishing Site
External
Information
sFlow
NetFlow
URL
SPAM Sender
URL
syslog
querylog
pcap
text
URL
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Data Volume
N*10GByte/day
20TB/10months
Traffic sampling
Packet dump
E-mail
DNS
Web traffic
5
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
1. Forensics : preserving log data
 To keep evidences as traceable.
 To analyze multi-source data exhaustively
2. Scalability : should be tolerable to huge data
 To store a huge amount of datasets
 To process datasets in a reasonable time
3. Real-time analysis : processing performance
 Possibly real-time analysis of any datasets
4. Uniform programmability :
 Various data format should be easily accessible
 Various analysis program can be used
Goals of MATATABI
6
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
NECOMA ECO System
Infrastructure
Data
End Point
Data
API API
Analysis Module /
Early Warning System
API
Threat
Information
Sharing
External
Knowledge DB
API
Crawler
API
External
Resource (web)
Infrastructure
Devices
End Point
Devices
API API
Resilience Mechanism
API
Get external
threat information
Get data
Put analysis results
Get threat
information
and other
results Get threat information
Control infrastructure and
end point devices
Crawling external resource
and extracting knowledge
Collection Probe Collection Probe
Get data
Petsas et al., A Trusted Knowledge Management System for
Multi-layer Threat Analysis. TRUST 14’ (poster session), June 2014
7
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
sflow
netflow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
 4 components
1) Storage
2) Data import/process module
3) Analysis module
4) Application Programming Interface (API)
MATATABI Overview
8
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Built by Open-Source Software
 Actively using open-sourced software
 Apace Hadoop (HDFS, MapReduce, etc)
 Apache Hive (SQL-like language => distributed jobs)
 Facebook Presto (Distributed SQL engine)
 Apache Mahout (Machine learning library)
 Apache Thrift (Language bindings)
 Hadoop-pcap (pcap file parser)
 Fixed issues and packaged by NECOMA
 https://github.com/necoma
9
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
1) Storage
 Storing measured data
to Hadoop Distributed
FileSystem (HDFS)
 Easily scaled-out
• Data access by tools
– Hive/Presto-db
– Hadoop-pcap
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
sflow
netflow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
10
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
2) Data import module
 Pre-processing
measurement data
• By each dataset
– Raw data (e.g., pcap)
– Converting to Hive tables
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
sflow
netflow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
11
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
3) (Threat) Analysis module
 Easily implement-able
 Bunch of analysis
 Distributed computations
(MapReduce)
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
sflow
netflow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
12
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
4) Application Programming Interface (API)
 Export analysis results
 Export dataset itself (if
needed)
 Implemented with n6
REST API
 JSON/CSV/IODEF format
HDFS
DGA
Analyzer
DDoS
detection
Hive/
Presto
Thrift Mahout Rhadoop
DNS querylog
dns-pcap
sflow
netflow
spam
open resolver
phishing
darknet
topology
endpoint
user behavior
client honeypot
Hadoop Cluster
API (JSON)
hadoop-
pcap
anomaly
detection
(2) Data
import
Measurement
Data
(3) Analysis
Module
(1) Data
Storage
(4) MATATAPI
13
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Analysis Modules (Use cases)
14
Name Datasets Frequency LoC
(#lines)
Remark
ZeuS DGA detector DNS pcap, netflow daily 25 hadoop-pcap
UDP fragmentation detector sflow daily 48
Phishing likelihood calculator Phishing URLs,
Phishing content
1-shot –
Mahout
(RandomForest)
NTP amplifier detector
netflow, sflow daily 143
pyhive, Maxmind
GeoIP
sflow daily 24
DNS amplifier detector sflow, open resolver
[19]
daily 37
Anomalous heavy-hitter
detector
netflow, sflow daily 106
pyhive
DNS anomaly detection DNS pcap, whois,
malicious/legitimate
domain list
daily 57
hadoop-pcap, Mahout
(RandomForest)
SSL scan detector sflow 1-shot 36
DNS failure graph analysis DNS pcap daily 159 pyhive
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
• Make a SQL request by Presto
• Get IP addresses that sends UDP traffic on
port 123 with a packet size = 468
• Packet size of Monlist reply = 468 bytes
15
Analysis Example (1)
Finding NTP Amplifiers
SELECT sa FROM netflow WHERE sp=123 AND pr='UDP' AND
ibyt/ipkt=468 GROUP BY sa
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
presto:default> SELECT sa FROM netflow_wide_rcfile WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 AND
dt>'20150401' GROUP BY sa;
Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits
0:11 [ 457M rows, 9.8GB] [41.3M rows/s, 908MB/s] [======>>>>>> ] 14%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 1.88K 135 33.2K 2.39K 0 8 0
2.....R 457M 32.9M 9.8G 723M 622 94 120
Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits
1:05 [1.63B rows, 37.7GB] [25.2M rows/s, 596MB/s] [===========================>>>>>>>> ] 64%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 16.9K 260 299K 4.61K 0 8 0
2.....R 1.63B 25.1M 37.7G 595M 147 147 542
16
Analysis Example (1)
Finding NTP Amplifiers
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
sa
-----------------
17
Analysis Example (1)
Finding NTP Amplifiers
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 18
Analysis Example (2)
Detecting DNS Amplifier Attacks
Open Resolver
DNS Server
Attackers
Spoofed Packets
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
 Found Response with RD(Recursive Desired)
flag.
 Queries from Open Resolver Servers
 Attempts of the Water Torture Attack
select src,count(*) from dns_pcaps where dt='20150401' and dns_qr=true and
dns_flags like '%rd%' and server=‘dns1-pcap’ group by src;
Analysis Example (2)
Detecting DNS Amplifier Attacks
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 20
Authoritative
DNS Servers
Resolver
DNS Server
Attackers
Spoofed
Answers
Analysis Example (3)
Detecting DNS Cache Poisoning Attacks
Query
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Analysis Example (3)
Detecting DNS Cache Poisoning Attacks
 Normally
# of query from resolver server > # of query to resolver server
 Counting number of queries from resolver server
 Counting number of answers to resolver server
 If not, it is possibly ddos or cache poisoning attack
against our DNS resolver server
select floor(ts/60),count(*) from dns_pcaps where dt = '20150401’ and dns_qr=false and
dns_flags not like ‘%rd%’ and server=’ns1-pcap‘ group by floor(ts/60);
select floor(ts/60),count(*) from dns_pcaps where dt = '20150401’ and dns_qr=true and
dns_flags like ‘%aa%’ and server=‘ns1-pcap’ group by floor(ts/60);
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Detecting Botnet infected hosts
by DGA Queries
22
• Domain Generation
Algorithm (DGA)
– Auto generated domain
names used by botnets
– Usually the names are
changed in a short span
– Difficult to detect botnets
hosts by domain name.
• ZeuS-DGA
– [a-z0-
9]{32,48}.(ru|com|biz|info|o
rg|net)
– Example:
f528764d624db129b32c21fbc
a0cb8d6.com
001: gh3t852dwps7v47v4139eid62g190bjrs
002: g22tdk3q8097o97fcs0j46fe0l7wc56us
003: gj9d611364m0ysceiq0x250fm5u69zq5s
:
botmaster
bot
domain list: periodically generate
001: gh3t852dwps7v47v4139eid62g190bjrs
002: g22tdk3q8097o97fcs0j46fe0l7wc56us
003: gj9d611364m0ysceiq0x250fm5u69zq5s
:
domain list: periodically generate
g22tdk3q8097o97fcs0j46fe0l7wc56us.ru
001.ru 001.com 002.ru
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
 Found specific regular expression type in
queries
 Some botnet clients generate dynamic,
randomized DNS name to contact botnet
C&C servers (so called DGA)
select src,dns_question from dns_pcaps where regexp_like (dns_question,
'[a-z0-9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question,
'xn--') AND dt='20150401';
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
presto:default> select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0-
9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt>'20150401';
Query 20150810_114848_00226_u378i, RUNNING, 11 nodes, 1,435 splits
1:17 [ 123M rows, 4.15GB] [1.61M rows/s, 55.5MB/s] [ <=> ]
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......S 123M 1.61M 4.15G 55.5M 1100 217 117
Query 20150810_115500_00228_u378i, RUNNING, 11 nodes, 143 splits
2:22 [87.4M rows, 4.73GB] [ 615K rows/s, 34.1MB/s] [========================================>>] 93%
STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE
0.........R 0 0 0B 0B 0 1 0
1.......R 87.4M 615K 4.73G 34.1M 0 9 133
24
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
2001:XXXX:1d8:0:0:0:0:106 | cg79wo20kl92doowfn01oqpo9mdieowv5tyj. 0 IN A
2001:XXXX:0:1:0:0:0:f | cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com. 0 IN A
157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
23.XXX.104.44 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A
157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
23.XXX.111.231 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
173.XXX.59.40 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
192.XXX.79.30 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
185.XXX.155.12 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
173.XXX.58.45 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A
25
Analysis Example (4)
Detecting DGA Queries
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Movie : Zeus-DGA Analysis
26
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Visualization of Zeus DGA and Botnet
 2015/07/01 – 2015/07/05
 The number of the most active DGA query is 23
 Related traffic flows from netflow datasets.
27
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Visualization : Zeus-DGA Distribution
28
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
One of Protection Methods
 SDN IX (PIX-IE)
 Programmable IX in Edo : PIX-IE
 Mitigating and filtering suspicious flows at IX
 IX is a public space in the Internet
 Before link saturation, an ISP operator can stop DDoS
flows
29
Programmable IX
(PIX-IE)
ISP
ISP ISP
ISP
ISP
ISP
Vic m
ISP Vic m Service
Spoofed SRC UDP
Link
Satura on
The operator has to contact to
each ISP, and ask to filter the
DDoS packets …
Human
Interac on
Programmable IX
(PIX-IE)
ISP
ISP ISP
ISP
ISP
ISP
Vic m
ISP Vic m Service
Mi ga on
Mi ga on
Mi ga on
Mi ga on
REST API
Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu
Summary and Ongoing Work
 MATATABI: a platform for threat analysis
 Exploiting (existing) big data software
 Data collection to threat knowledge base
 Toward security information pipeline
 Enrichment of analytical results
 To policy enforcement
 Real-time analysis
30
ProtectionData Analysis
Human
Inputs

More Related Content

What's hot

Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemChris Huang
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDataWorks Summit
 
Understanding apache-druid
Understanding apache-druidUnderstanding apache-druid
Understanding apache-druidSuman Banerjee
 
Matching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software ArchitecturesMatching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software ArchitecturesGeoffrey Fox
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Chris Huang
 
Druid Scaling Realtime Analytics
Druid Scaling Realtime AnalyticsDruid Scaling Realtime Analytics
Druid Scaling Realtime AnalyticsAaron Brooks
 
Energy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshopEnergy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshopQuantUniversity
 
Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...Geoffrey Fox
 
Deep Learning vs. Cheap Learning
Deep Learning vs. Cheap LearningDeep Learning vs. Cheap Learning
Deep Learning vs. Cheap LearningMapR Technologies
 
What is the "Big Data" version of the Linpack Benchmark? ; What is “Big Data...
What is the "Big Data" version of the Linpack Benchmark?; What is “Big Data...What is the "Big Data" version of the Linpack Benchmark?; What is “Big Data...
What is the "Big Data" version of the Linpack Benchmark? ; What is “Big Data...Geoffrey Fox
 
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex BlackTestistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex BlackTurkish Testing Board
 
Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...DataWorks Summit
 
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...DataWorks Summit/Hadoop Summit
 
Apache Eagle: eBay构建开源分布式实时预警引擎实践
Apache Eagle: eBay构建开源分布式实时预警引擎实践Apache Eagle: eBay构建开源分布式实时预警引擎实践
Apache Eagle: eBay构建开源分布式实时预警引擎实践Hao Chen
 
Apache Eagle Dublin Hadoop Summit 2016
Apache Eagle   Dublin Hadoop Summit 2016Apache Eagle   Dublin Hadoop Summit 2016
Apache Eagle Dublin Hadoop Summit 2016Edward Zhang
 
Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016Arun Karthick Manoharan
 
Cloud Services for Big Data Analytics
Cloud Services for Big Data AnalyticsCloud Services for Big Data Analytics
Cloud Services for Big Data AnalyticsGeoffrey Fox
 
Strata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case StudiesStrata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case StudiesPaco Nathan
 

What's hot (20)

Real time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystemReal time big data applications with hadoop ecosystem
Real time big data applications with hadoop ecosystem
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data Analytics
 
Understanding apache-druid
Understanding apache-druidUnderstanding apache-druid
Understanding apache-druid
 
Data Science Crash Course
Data Science Crash CourseData Science Crash Course
Data Science Crash Course
 
Matching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software ArchitecturesMatching Data Intensive Applications and Hardware/Software Architectures
Matching Data Intensive Applications and Hardware/Software Architectures
 
Scaling big-data-mining-infra2
Scaling big-data-mining-infra2Scaling big-data-mining-infra2
Scaling big-data-mining-infra2
 
Druid Scaling Realtime Analytics
Druid Scaling Realtime AnalyticsDruid Scaling Realtime Analytics
Druid Scaling Realtime Analytics
 
Energy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshopEnergy analytics with Apache Spark workshop
Energy analytics with Apache Spark workshop
 
Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...Comparing Big Data and Simulation Applications and Implications for Software ...
Comparing Big Data and Simulation Applications and Implications for Software ...
 
Deep Learning vs. Cheap Learning
Deep Learning vs. Cheap LearningDeep Learning vs. Cheap Learning
Deep Learning vs. Cheap Learning
 
What is the "Big Data" version of the Linpack Benchmark? ; What is “Big Data...
What is the "Big Data" version of the Linpack Benchmark?; What is “Big Data...What is the "Big Data" version of the Linpack Benchmark?; What is “Big Data...
What is the "Big Data" version of the Linpack Benchmark? ; What is “Big Data...
 
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex BlackTestistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
Testistanbul 2016 - Keynote: "Enterprise Challenges of Test Data" by Rex Black
 
Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...Improving Organizational Knowledge with Natural Language Processing Enriched ...
Improving Organizational Knowledge with Natural Language Processing Enriched ...
 
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
 
Apache Eagle: eBay构建开源分布式实时预警引擎实践
Apache Eagle: eBay构建开源分布式实时预警引擎实践Apache Eagle: eBay构建开源分布式实时预警引擎实践
Apache Eagle: eBay构建开源分布式实时预警引擎实践
 
Apache Eagle Dublin Hadoop Summit 2016
Apache Eagle   Dublin Hadoop Summit 2016Apache Eagle   Dublin Hadoop Summit 2016
Apache Eagle Dublin Hadoop Summit 2016
 
Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016Apache Eagle Strata Hadoop World London 2016
Apache Eagle Strata Hadoop World London 2016
 
Cloud Services for Big Data Analytics
Cloud Services for Big Data AnalyticsCloud Services for Big Data Analytics
Cloud Services for Big Data Analytics
 
Cloudbreak - Technical Deep Dive
Cloudbreak - Technical Deep DiveCloudbreak - Technical Deep Dive
Cloudbreak - Technical Deep Dive
 
Strata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case StudiesStrata EU 2014: Spark Streaming Case Studies
Strata EU 2014: Spark Streaming Case Studies
 

Viewers also liked

Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview Hortonworks
 
"Big Data" in the Energy Industry
"Big Data" in the Energy Industry"Big Data" in the Energy Industry
"Big Data" in the Energy IndustryPaige Bailey
 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesGregg Barrett
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access SecurityCloudera, Inc.
 
Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview Senthil Kumar
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Real time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationReal time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationLeMeniz Infotech
 
Hadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache KnoxHadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache KnoxVinay Shukla
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyHitachi Vantara
 
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONREAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONI3E Technologies
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data scienceMahesh Kumar CV
 
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneOpen-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneInnovative Management Services
 
Mr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricMr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricRohan Pinto
 
Smart Analytics For The Utility Sector
Smart Analytics For The Utility SectorSmart Analytics For The Utility Sector
Smart Analytics For The Utility SectorHerman Bosker
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentDavid Wallom
 

Viewers also liked (19)

Hadoop security
Hadoop securityHadoop security
Hadoop security
 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview
 
"Big Data" in the Energy Industry
"Big Data" in the Energy Industry"Big Data" in the Energy Industry
"Big Data" in the Energy Industry
 
Big Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and ChallengesBig Data: Opportunities, Strategy and Challenges
Big Data: Opportunities, Strategy and Challenges
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
 
Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview Hadoop Ecosystem Architecture Overview
Hadoop Ecosystem Architecture Overview
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Real time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationReal time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing application
 
Hadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache KnoxHadoop Security Today & Tomorrow with Apache Knox
Hadoop Security Today & Tomorrow with Apache Knox
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage Strategy
 
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONREAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Add
AddAdd
Add
 
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data science
 
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneOpen-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
 
Mr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricMr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electric
 
Smart Analytics For The Utility Sector
Smart Analytics For The Utility SectorSmart Analytics For The Utility Sector
Smart Analytics For The Utility Sector
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the Environment
 

Similar to MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets

Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsMarco Casassa Mont
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityAPNIC
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber AnalyticsNovetta
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 
Best practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at RenaultBest practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at RenaultDataWorks Summit
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...OpenDNS
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...APNIC
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]APNIC
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalPriyanka Aash
 

Similar to MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets (20)

Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Novetta Cyber Analytics
Novetta Cyber AnalyticsNovetta Cyber Analytics
Novetta Cyber Analytics
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Best practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at RenaultBest practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at Renault
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
Backtrack
BacktrackBacktrack
Backtrack
 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
 

More from APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

More from APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

Recently uploaded

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets

  • 1. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu MATATABI : Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets Yuji Sekiya* *The University of Tokyo, Japan
  • 2. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Multi-layer Threat Analysis Victim side action Filtering Load balancing Isolation Countermeasure for Attackers Report to ISP Announce to users Filtering at ISP level Configuration to servers Data collection at Multiple layers/locations Network device Servers Users Device Analysis Platform Analysis 1 Analysis 2 Analysis 3 Threat analysis (detection) across multiple datasources Threat Information Share Among organizations Announce to public 2
  • 3. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Security Information Pipeline  Making pipeline through divert activities  Data collection (Traffic, User behavior, etc)  Threat Analysis  Human decision  Protection (Enforcement) ProtectionData Analysis Human Inputs 3
  • 4. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Datasets 4 MATATABI Switch Router DNS Firewall SPAM Phishing Site External Information sFlow NetFlow URL SPAM Sender URL syslog querylog pcap text URL
  • 5. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Data Volume N*10GByte/day 20TB/10months Traffic sampling Packet dump E-mail DNS Web traffic 5
  • 6. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 1. Forensics : preserving log data  To keep evidences as traceable.  To analyze multi-source data exhaustively 2. Scalability : should be tolerable to huge data  To store a huge amount of datasets  To process datasets in a reasonable time 3. Real-time analysis : processing performance  Possibly real-time analysis of any datasets 4. Uniform programmability :  Various data format should be easily accessible  Various analysis program can be used Goals of MATATABI 6
  • 7. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu NECOMA ECO System Infrastructure Data End Point Data API API Analysis Module / Early Warning System API Threat Information Sharing External Knowledge DB API Crawler API External Resource (web) Infrastructure Devices End Point Devices API API Resilience Mechanism API Get external threat information Get data Put analysis results Get threat information and other results Get threat information Control infrastructure and end point devices Crawling external resource and extracting knowledge Collection Probe Collection Probe Get data Petsas et al., A Trusted Knowledge Management System for Multi-layer Threat Analysis. TRUST 14’ (poster session), June 2014 7
  • 8. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap sflow netflow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI  4 components 1) Storage 2) Data import/process module 3) Analysis module 4) Application Programming Interface (API) MATATABI Overview 8
  • 9. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Built by Open-Source Software  Actively using open-sourced software  Apace Hadoop (HDFS, MapReduce, etc)  Apache Hive (SQL-like language => distributed jobs)  Facebook Presto (Distributed SQL engine)  Apache Mahout (Machine learning library)  Apache Thrift (Language bindings)  Hadoop-pcap (pcap file parser)  Fixed issues and packaged by NECOMA  https://github.com/necoma 9
  • 10. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 1) Storage  Storing measured data to Hadoop Distributed FileSystem (HDFS)  Easily scaled-out • Data access by tools – Hive/Presto-db – Hadoop-pcap HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap sflow netflow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 10
  • 11. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 2) Data import module  Pre-processing measurement data • By each dataset – Raw data (e.g., pcap) – Converting to Hive tables HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap sflow netflow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 11
  • 12. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 3) (Threat) Analysis module  Easily implement-able  Bunch of analysis  Distributed computations (MapReduce) HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap sflow netflow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 12
  • 13. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 4) Application Programming Interface (API)  Export analysis results  Export dataset itself (if needed)  Implemented with n6 REST API  JSON/CSV/IODEF format HDFS DGA Analyzer DDoS detection Hive/ Presto Thrift Mahout Rhadoop DNS querylog dns-pcap sflow netflow spam open resolver phishing darknet topology endpoint user behavior client honeypot Hadoop Cluster API (JSON) hadoop- pcap anomaly detection (2) Data import Measurement Data (3) Analysis Module (1) Data Storage (4) MATATAPI 13
  • 14. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Analysis Modules (Use cases) 14 Name Datasets Frequency LoC (#lines) Remark ZeuS DGA detector DNS pcap, netflow daily 25 hadoop-pcap UDP fragmentation detector sflow daily 48 Phishing likelihood calculator Phishing URLs, Phishing content 1-shot – Mahout (RandomForest) NTP amplifier detector netflow, sflow daily 143 pyhive, Maxmind GeoIP sflow daily 24 DNS amplifier detector sflow, open resolver [19] daily 37 Anomalous heavy-hitter detector netflow, sflow daily 106 pyhive DNS anomaly detection DNS pcap, whois, malicious/legitimate domain list daily 57 hadoop-pcap, Mahout (RandomForest) SSL scan detector sflow 1-shot 36 DNS failure graph analysis DNS pcap daily 159 pyhive
  • 15. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu • Make a SQL request by Presto • Get IP addresses that sends UDP traffic on port 123 with a packet size = 468 • Packet size of Monlist reply = 468 bytes 15 Analysis Example (1) Finding NTP Amplifiers SELECT sa FROM netflow WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 GROUP BY sa
  • 16. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu presto:default> SELECT sa FROM netflow_wide_rcfile WHERE sp=123 AND pr='UDP' AND ibyt/ipkt=468 AND dt>'20150401' GROUP BY sa; Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits 0:11 [ 457M rows, 9.8GB] [41.3M rows/s, 908MB/s] [======>>>>>> ] 14% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 1.88K 135 33.2K 2.39K 0 8 0 2.....R 457M 32.9M 9.8G 723M 622 94 120 Query 20150810_090728_00174_u378i, RUNNING, 10 nodes, 845 splits 1:05 [1.63B rows, 37.7GB] [25.2M rows/s, 596MB/s] [===========================>>>>>>>> ] 64% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 16.9K 260 299K 4.61K 0 8 0 2.....R 1.63B 25.1M 37.7G 595M 147 147 542 16 Analysis Example (1) Finding NTP Amplifiers
  • 17. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu sa ----------------- 17 Analysis Example (1) Finding NTP Amplifiers
  • 18. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 18 Analysis Example (2) Detecting DNS Amplifier Attacks Open Resolver DNS Server Attackers Spoofed Packets
  • 19. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu  Found Response with RD(Recursive Desired) flag.  Queries from Open Resolver Servers  Attempts of the Water Torture Attack select src,count(*) from dns_pcaps where dt='20150401' and dns_qr=true and dns_flags like '%rd%' and server=‘dns1-pcap’ group by src; Analysis Example (2) Detecting DNS Amplifier Attacks
  • 20. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 20 Authoritative DNS Servers Resolver DNS Server Attackers Spoofed Answers Analysis Example (3) Detecting DNS Cache Poisoning Attacks Query
  • 21. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Analysis Example (3) Detecting DNS Cache Poisoning Attacks  Normally # of query from resolver server > # of query to resolver server  Counting number of queries from resolver server  Counting number of answers to resolver server  If not, it is possibly ddos or cache poisoning attack against our DNS resolver server select floor(ts/60),count(*) from dns_pcaps where dt = '20150401’ and dns_qr=false and dns_flags not like ‘%rd%’ and server=’ns1-pcap‘ group by floor(ts/60); select floor(ts/60),count(*) from dns_pcaps where dt = '20150401’ and dns_qr=true and dns_flags like ‘%aa%’ and server=‘ns1-pcap’ group by floor(ts/60);
  • 22. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Detecting Botnet infected hosts by DGA Queries 22 • Domain Generation Algorithm (DGA) – Auto generated domain names used by botnets – Usually the names are changed in a short span – Difficult to detect botnets hosts by domain name. • ZeuS-DGA – [a-z0- 9]{32,48}.(ru|com|biz|info|o rg|net) – Example: f528764d624db129b32c21fbc a0cb8d6.com 001: gh3t852dwps7v47v4139eid62g190bjrs 002: g22tdk3q8097o97fcs0j46fe0l7wc56us 003: gj9d611364m0ysceiq0x250fm5u69zq5s : botmaster bot domain list: periodically generate 001: gh3t852dwps7v47v4139eid62g190bjrs 002: g22tdk3q8097o97fcs0j46fe0l7wc56us 003: gj9d611364m0ysceiq0x250fm5u69zq5s : domain list: periodically generate g22tdk3q8097o97fcs0j46fe0l7wc56us.ru 001.ru 001.com 002.ru
  • 23. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu  Found specific regular expression type in queries  Some botnet clients generate dynamic, randomized DNS name to contact botnet C&C servers (so called DGA) select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0-9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt='20150401'; Analysis Example (4) Detecting DGA Queries
  • 24. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu presto:default> select src,dns_question from dns_pcaps where regexp_like (dns_question, '[a-z0- 9]{32,48}.(ru|com|biz|info|org|net)') AND NOT regexp_like(dns_question, 'xn--') AND dt>'20150401'; Query 20150810_114848_00226_u378i, RUNNING, 11 nodes, 1,435 splits 1:17 [ 123M rows, 4.15GB] [1.61M rows/s, 55.5MB/s] [ <=> ] STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......S 123M 1.61M 4.15G 55.5M 1100 217 117 Query 20150810_115500_00228_u378i, RUNNING, 11 nodes, 143 splits 2:22 [87.4M rows, 4.73GB] [ 615K rows/s, 34.1MB/s] [========================================>>] 93% STAGES ROWS ROWS/s BYTES BYTES/s QUEUED RUN DONE 0.........R 0 0 0B 0B 0 1 0 1.......R 87.4M 615K 4.73G 34.1M 0 9 133 24 Analysis Example (4) Detecting DGA Queries
  • 25. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu 2001:XXXX:1d8:0:0:0:0:106 | cg79wo20kl92doowfn01oqpo9mdieowv5tyj. 0 IN A 2001:XXXX:0:1:0:0:0:f | cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com. 0 IN A 157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 23.XXX.104.44 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN A 157.XXX.234.35 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 133.XXX.127.131 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 23.XXX.111.231 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 133.XXX.124.164 | 96e4c3658d4cb4b559057995ae5a382c.com. 0 IN AAAA 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 173.XXX.59.40 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 192.XXX.79.30 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 185.XXX.155.12 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 157.XXX.193.67 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.127.131 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 173.XXX.58.45 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 133.XXX.124.164 | bf3b6eb48a734f3abae02ae1d7ff62e7.com. 0 IN A 25 Analysis Example (4) Detecting DGA Queries
  • 26. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Movie : Zeus-DGA Analysis 26
  • 27. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Visualization of Zeus DGA and Botnet  2015/07/01 – 2015/07/05  The number of the most active DGA query is 23  Related traffic flows from netflow datasets. 27
  • 28. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Visualization : Zeus-DGA Distribution 28
  • 29. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu One of Protection Methods  SDN IX (PIX-IE)  Programmable IX in Edo : PIX-IE  Mitigating and filtering suspicious flows at IX  IX is a public space in the Internet  Before link saturation, an ISP operator can stop DDoS flows 29 Programmable IX (PIX-IE) ISP ISP ISP ISP ISP ISP Vic m ISP Vic m Service Spoofed SRC UDP Link Satura on The operator has to contact to each ISP, and ask to filter the DDoS packets … Human Interac on Programmable IX (PIX-IE) ISP ISP ISP ISP ISP ISP Vic m ISP Vic m Service Mi ga on Mi ga on Mi ga on Mi ga on REST API
  • 30. Yuji Sekiya <sekiya@wide.ad.jp> www.necoma-project.eu Summary and Ongoing Work  MATATABI: a platform for threat analysis  Exploiting (existing) big data software  Data collection to threat knowledge base  Toward security information pipeline  Enrichment of analytical results  To policy enforcement  Real-time analysis 30 ProtectionData Analysis Human Inputs

Editor's Notes

  1. セキュリティ情報のパイプライン構築
  2. Controlling several pieces of network components (measurements, analysis, endpoints, others actiivties) via Threat Information sharing (NECOMAtter)
  3. netflowテーブルスキーマの説明