SlideShare a Scribd company logo
1 of 36
Download to read offline
IT Operation Analytic
for Security Santisook L.
18 June 2016
#MiSSConf(SP1)
CP-Tower
Who am I ?
• Santisook Limpeeticharoenchot .
• Telecom Engineering, Business&Economic.
• 16 years ago : Network Engineer. Implemented NW, Security
for ISP/Telco, Bank, State Enterprise and Government.
• 8 years ago : Managed Service Network & Outsourcing,
Sales&Business Development.
• 5 years ago : Started Machine Data Analytic.
• Current : Sales Director@Stelligence Co.,Ltd : Operational
Intelligence,Big Data &IT Operation Analytic Company.
• Interested in : Big Data, Network & Security, Innovation &
Entrepreneur, Math, BizModel, StartupEcosystem, …
Topics
• Challenge & Demand
• What’s ITOA ?
• Anomaly Detection
• Security Use cases
• Q&A
What are CIO priorities ?
Pro-active alerting and troubleshooting
SLA
Performance monitoring, trending and tuning
User experience
Detect abnormal behaviors and data exfiltration
Data security
Understanding demographics, behaviors and patterns
Business
intelligence and
analytics
Forces driving need for Operation Analytic
• More Data, More Complexity, New Technology
and New Attack
• Dynamic , Big Impact, Required high skill resources
• Lack of completed visibility
• Required Actionable information
Lack of Visibility Hurts
How to get visibility ?
http://www.datacenterjournal.com/time-analytics-delivers-operations/
Big Data Anywhere
“89% of business leaders believe Big Data will revolutionize business
operations in the same way the Internet did”
“83% have pursued Big Data projects in order to seize a competitive
edge”
“Global Big Data and Analytics market will reach $125B in hardware,
software and services revenue this year”
“Banking, communications, media, utilities and wholesale trade
increased their use of Big Data analytics the most in the last 12
months”
Big Data 3.0
Big Data Anywhere
BIG DATA "USE CASES" WITHIN BUSINESS
48% Customer Analytics
21% Operational Analytics
12% Fraud and Compliance
10% New Product & Service
Innovation
10% Enterprise Data Warehouse
Optimization
12%
10%
Source : Datameer: Big Data: A Competitive Weapon for the Enterprise.
48%
21%
10%
ITOA is IT Operations' next big thing
ITOA is 'On the Rise' on the hype cycle, and
expects it to accelerate to integrate into
mainstream IT operations in the next few
years, with the emergence of an entire
category of IT Operations Analytics
products and services.
Hype Cycle for IT Infrastructure Availability
and Performance Management, 2015
It refers to a set of processes and technologies that:
• Helps discover complex patterns in high volumes of IT system usage and performance data
• Helps to identify problems and system behaviors faster, so as to rectify the problem(s) before they can arise
• Automates the process of collecting, organizing, analyzing, and identifying patterns in a highly distributed,
diverse and continuously changing application data environment.
• Ensures an improved IT system performance and continuity
• Relies heavily on Big Data Analytics.
What’s is ITOA?
Streamline data analysis,
automate correlations,
and increase productivity
React quickly to events /
data generated by
infrastructure, software,
services, user devices
Optimize service levels
and workload allocations
Unleash innovation and
create business value
Top Benefits Expected from ITOA
67%
Improved IT Staff
Productivity
Better IT infrastructure
utilization and optimization
53%
Improved infrastructure
availability and reduced downtime
51%
Improved application code
quality and defect reduction
Better application
performance service levels
Users look to operations analytics to yield :
(Source : IDC)
ITOA is game changing.
Unleashing Innovation and Business Value with
“IT OPERATIONS ANALYTICS”
http://www.itoa-landscape.org/
Analytic Required in Security domain
Data Breaches, Detected
Late, Undetected.
• Move from Descriptive to Predictive Analysis
• TopN -> Unsupervised Machine Learning
• Static Threshold-> Dynamic Threshold
• Predefine Correlation Rules -> Auto detect
abnormaly
Major Issues in Detection and Response :
Source: Analytics and Intelligence Survey 2014, a SANS Survey,
Written by David Shackleford, October 2014, p8
Source: Advanced Threat Detection with Machine-Generated
Intelligence, Ponemon Institute, September 2015
Understanding the Challenge:
What’s Normal or Abnormal In These Log Events?
Let’s do test for anomaly detection…
• Thresholds cannot catch this anomaly in periodic data
Anomaly Detection
Probabilistic Modeling and Analysis
• Not just simple “Bell Curve” (average,
stddev) that other techniques use
• sophisticated machine-learning
techniques to best-fit the right
statistical model for your data.
• Bayesian distribution modeling, time-
series decomposition, clustering, and
correlation analysis
• Better models = better outlier
detection = less false alarms
Models Matter
• Simple models miss real outliers • Automatic Models with “Detectors”
Outliers
<0.01% chance
likelihood
observed values
X
Model
Gaussian
Rare Events
Deviations in
Counts or Values
Unusual vs. peers
=
=
=
“responsetime by host”
“count by error_type”
“rare by EventID”
“rare by process”
“sum(bytes) over client_ip”
Use Case 1:
Find metrics deviation in time series
• Automatic periodicity
Use Case 2:
Find Important IDS/IPS Events
Challenge:
How do you find the signs of advanced threats amid
thousands of daily high-severity alerts?
 Difficulty of creating effective rules
results in a high false positive rate
 Advanced Evasion Techniques (AETs)
well-known to attackers
Use Case 2:
Find Important IDS/IPS Events
Solution:
Let machine learning filter out normal ‘noise’ and identify unusual
counts, signatures, protocols and destinations by source
• Anomaly Detective generates
a dozen or so alerts per week
• Accuracy & alert detail enable
faster determination of threat
level
I like AD because I haven’t had to
tune a single IDS rule since it was
deployed.
- Craig Merchant, Senior Security
Architect, Oracle
Use Case 3:
Detect DNS Tunneling Activity
Challenge:
How do you detect DNS Tunneling (C2, data exfiltrations
or other abuses of DNS) ?
 Encrypted messages disguised as
subdomains can contain control or data
payloads
 Insufficient monitoring of DNS for
‘tunneling’ activity poses a significant risk
Calculated information content= 3126
Deviations in
Counts or Values
Use Case 3:
Detect DNS Tunneling Activity
What impresses me about Anomaly
Detective is its ability to automatically find
anomalous behavior in machine data by
relying on trends in the data itself instead
of hard-coding rules.
- Peter Davis, CTO, Turnberry Solutions
Solution:
By detecting anomalies in DNS query subdomain
characteristics
• Use Case: Learn typical processes on each host
• Find rare processes that “start up and communicate”
Use Case 3:
Rare Items as Anomalies
Rare Events
Finds FTP process running
for 3 hours on system
that doesn’t normally run
Use Case 4:
Rare Items as Anomalies
= “rare by process”
Use Case 5:
Population / Peer Outliers
• Host sending 20,000
requests/hours
• Attempt to hack an IIS
webserver
= “sum(bytes) over host”
Unusual vs. peers
Adding Value to existing SIEM
• Better results than threshold based searches
• Example: “Unusual AD access”
• SIEM: 148 notables/day
• Anomaly Detection: 2 significant anomalies/week (500x reduction)
• Example: “Proxy Data Exfiltration”
• SIEM: sum(bytes_out) > 10MB => 50,000 notables/month
• Anomaly Detection: 12 significant anomalies, including exfiltrations <10 MB
• More sophisticated anomaly detection
• Example: DNS Tunneling, Malware Command & Control Activity
Value – Less time/effort for humans to triage
Value – Reduce risk by detecting APTs, malware, rogue users that
otherwise go unnoticed
Additional Security Applications
No. Threat Indicator Category Identify… …By Finding Anomalies In
1 Data Exfiltration
Credit card numbers, Electronic Health
Records being stolen
Firewall Logs, Web Proxy Logs, Secure Web
Gateway Logs, DNS Logs
2 Malware Command & Control Activity Infected systems beaconing
Web Proxy Logs, DNS Request Logs, Firewall
Logs
3 Suspicious Account Activity New account creation, privilege changes Server, Directory Logs, Audit Logs
4 Unauthorized Login Attempts/Activity Smart brute force attacks Server, Directory Logs, Audit Logs
5 Compromised Endpoints Spreading malware internally EDR/ AV logs, Netflow records
6 Suspicious Server Behaviors New bit torrents, chat rooms, file services Process starts, network connections
7 Unusual IDS/IPS Events Unusual security events from security tools IDS/IPS/IDP/NGFW logs
8 Unusual Network Activity
Launching DDoS attack, excessive DNS
requests
Firewall Logs, Web Proxy Logs, Secure Web
Gateway Logs, Netflow records, DPI Logs
9 Abusive/Attacking IP Addresses External data scrapers, internal snoopers
Firewall Logs, Web Proxy Logs, Secure Web
Gateway Logs, Netflow records, DPI Logs
10 Disabled/Interrupted Logging Attempts to hide tracks All types of log data
SANS: “Organizations Need To Understand Their
Environment And What Constitutes Normal And Abnormal
Behavior, Train Staff On How To Use Analytic Tools
And Define The Data They Need To Collect.”[1]
[1] Analytics and Intelligence Survey 2014, a SANS Survey, Written by David
Shackleford, October 2014 , p8.
http://www.sans.org/reading-room/whitepapers/analyst/analytics-intelligence-
survey-2014-35507
[2] http://digital-forensics.sans.org/media/poster_2014_find_evil.pdf
[2]
Summary Advantages of ITOA
• Reduces mean-time-to repair (MTTR) and Avoids downtime
• Increases insights into correlation of end-user interaction and
business activity
• Reduces operations cost with the efficient use of skilled
personal
• Applies pattern and statistics based algorithms
• Helps in extracting meaningful information
www.stelligence.com
www.facebook.com/stelligence.com
@stelligence.com
Santisook Limpeeticharoenchot
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)

More Related Content

What's hot

Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Alex Pinto
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
Aaron Friedman
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Alex Pinto
 

What's hot (20)

Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
 
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
 
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based DetectionBeyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
 
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
 
Baselining Logs
Baselining LogsBaselining Logs
Baselining Logs
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 

Viewers also liked

Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
EDUKETING
 
Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark) Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark)
Matt Turck
 

Viewers also liked (20)

Splunk for DataScience (.conf2014)
Splunk for DataScience (.conf2014)Splunk for DataScience (.conf2014)
Splunk for DataScience (.conf2014)
 
Are You Ready For The Omni-Channel Era?
Are You Ready For The Omni-Channel Era? Are You Ready For The Omni-Channel Era?
Are You Ready For The Omni-Channel Era?
 
Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
Eduketing 2015- Antes y después de Eduketing: Camino de la salvación. El caso...
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
Security As A Code :
Security As A Code : Security As A Code :
Security As A Code :
 
Innovate Better Through Machine data Analytics
Innovate Better Through Machine data AnalyticsInnovate Better Through Machine data Analytics
Innovate Better Through Machine data Analytics
 
IBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z SystemsIBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z Systems
 
Big Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT OperationsBig Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT Operations
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Splunk Quick Overview for Emirates Travel Hackathon
Splunk Quick Overview for Emirates Travel HackathonSplunk Quick Overview for Emirates Travel Hackathon
Splunk Quick Overview for Emirates Travel Hackathon
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization
 
Exploiting Blind Vulnerabilities
Exploiting Blind VulnerabilitiesExploiting Blind Vulnerabilities
Exploiting Blind Vulnerabilities
 
DevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-OnDevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-On
 
How to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT OperationsHow to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT Operations
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
 
Chapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibanaChapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibana
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Chapitre3 elk concepts_avances
Chapitre3 elk concepts_avancesChapitre3 elk concepts_avances
Chapitre3 elk concepts_avances
 
Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark) Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark)
 

Similar to IT Operation Analytic for security- MiSSconf(sp1)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

Similar to IT Operation Analytic for security- MiSSconf(sp1) (20)

Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability Keeping the Pulse of Your Data:  Why You Need Data Observability 
Keeping the Pulse of Your Data:  Why You Need Data Observability 
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs Matter
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 Keynote
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Machine Data Analytics
Machine Data AnalyticsMachine Data Analytics
Machine Data Analytics
 
AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-shared
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
How to improve your system monitoring
How to improve your system monitoringHow to improve your system monitoring
How to improve your system monitoring
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 

More from stelligence

More from stelligence (8)

BigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-shareBigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
BigData Visualization and Usecase@TDGA-Stelligence-11july2019-share
 
Santisook s telligence ai-innovation-digital big bang-thailand2018-share
Santisook s telligence ai-innovation-digital big bang-thailand2018-shareSantisook s telligence ai-innovation-digital big bang-thailand2018-share
Santisook s telligence ai-innovation-digital big bang-thailand2018-share
 
Recommend 10 splunk apps-Bangkok Splunk Meetup#1
Recommend 10 splunk apps-Bangkok Splunk Meetup#1Recommend 10 splunk apps-Bangkok Splunk Meetup#1
Recommend 10 splunk apps-Bangkok Splunk Meetup#1
 
Navy security contest-bigdataforsecurity
Navy security contest-bigdataforsecurityNavy security contest-bigdataforsecurity
Navy security contest-bigdataforsecurity
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.
 
SuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-finalSuanIct-Bigdata desktop-final
SuanIct-Bigdata desktop-final
 
Self-service Analytic for Business Users-19july2017-final
Self-service Analytic for Business Users-19july2017-finalSelf-service Analytic for Business Users-19july2017-final
Self-service Analytic for Business Users-19july2017-final
 
Bigdata for sme-industrial intelligence information-24july2017-final
Bigdata for sme-industrial intelligence information-24july2017-finalBigdata for sme-industrial intelligence information-24july2017-final
Bigdata for sme-industrial intelligence information-24july2017-final
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

IT Operation Analytic for security- MiSSconf(sp1)

  • 1. IT Operation Analytic for Security Santisook L. 18 June 2016 #MiSSConf(SP1) CP-Tower
  • 2. Who am I ? • Santisook Limpeeticharoenchot . • Telecom Engineering, Business&Economic. • 16 years ago : Network Engineer. Implemented NW, Security for ISP/Telco, Bank, State Enterprise and Government. • 8 years ago : Managed Service Network & Outsourcing, Sales&Business Development. • 5 years ago : Started Machine Data Analytic. • Current : Sales Director@Stelligence Co.,Ltd : Operational Intelligence,Big Data &IT Operation Analytic Company. • Interested in : Big Data, Network & Security, Innovation & Entrepreneur, Math, BizModel, StartupEcosystem, …
  • 3. Topics • Challenge & Demand • What’s ITOA ? • Anomaly Detection • Security Use cases • Q&A
  • 4. What are CIO priorities ? Pro-active alerting and troubleshooting SLA Performance monitoring, trending and tuning User experience Detect abnormal behaviors and data exfiltration Data security Understanding demographics, behaviors and patterns Business intelligence and analytics
  • 5. Forces driving need for Operation Analytic • More Data, More Complexity, New Technology and New Attack • Dynamic , Big Impact, Required high skill resources • Lack of completed visibility • Required Actionable information
  • 7. How to get visibility ? http://www.datacenterjournal.com/time-analytics-delivers-operations/
  • 8. Big Data Anywhere “89% of business leaders believe Big Data will revolutionize business operations in the same way the Internet did” “83% have pursued Big Data projects in order to seize a competitive edge” “Global Big Data and Analytics market will reach $125B in hardware, software and services revenue this year” “Banking, communications, media, utilities and wholesale trade increased their use of Big Data analytics the most in the last 12 months”
  • 10. Big Data Anywhere BIG DATA "USE CASES" WITHIN BUSINESS 48% Customer Analytics 21% Operational Analytics 12% Fraud and Compliance 10% New Product & Service Innovation 10% Enterprise Data Warehouse Optimization 12% 10% Source : Datameer: Big Data: A Competitive Weapon for the Enterprise. 48% 21% 10%
  • 11. ITOA is IT Operations' next big thing ITOA is 'On the Rise' on the hype cycle, and expects it to accelerate to integrate into mainstream IT operations in the next few years, with the emergence of an entire category of IT Operations Analytics products and services. Hype Cycle for IT Infrastructure Availability and Performance Management, 2015 It refers to a set of processes and technologies that: • Helps discover complex patterns in high volumes of IT system usage and performance data • Helps to identify problems and system behaviors faster, so as to rectify the problem(s) before they can arise • Automates the process of collecting, organizing, analyzing, and identifying patterns in a highly distributed, diverse and continuously changing application data environment. • Ensures an improved IT system performance and continuity • Relies heavily on Big Data Analytics.
  • 12. What’s is ITOA? Streamline data analysis, automate correlations, and increase productivity React quickly to events / data generated by infrastructure, software, services, user devices Optimize service levels and workload allocations Unleash innovation and create business value
  • 13. Top Benefits Expected from ITOA 67% Improved IT Staff Productivity Better IT infrastructure utilization and optimization 53% Improved infrastructure availability and reduced downtime 51% Improved application code quality and defect reduction Better application performance service levels Users look to operations analytics to yield : (Source : IDC)
  • 14. ITOA is game changing. Unleashing Innovation and Business Value with “IT OPERATIONS ANALYTICS” http://www.itoa-landscape.org/
  • 15. Analytic Required in Security domain Data Breaches, Detected Late, Undetected. • Move from Descriptive to Predictive Analysis • TopN -> Unsupervised Machine Learning • Static Threshold-> Dynamic Threshold • Predefine Correlation Rules -> Auto detect abnormaly
  • 16. Major Issues in Detection and Response : Source: Analytics and Intelligence Survey 2014, a SANS Survey, Written by David Shackleford, October 2014, p8 Source: Advanced Threat Detection with Machine-Generated Intelligence, Ponemon Institute, September 2015
  • 17. Understanding the Challenge: What’s Normal or Abnormal In These Log Events?
  • 18. Let’s do test for anomaly detection… • Thresholds cannot catch this anomaly in periodic data
  • 20. Probabilistic Modeling and Analysis • Not just simple “Bell Curve” (average, stddev) that other techniques use • sophisticated machine-learning techniques to best-fit the right statistical model for your data. • Bayesian distribution modeling, time- series decomposition, clustering, and correlation analysis • Better models = better outlier detection = less false alarms
  • 21. Models Matter • Simple models miss real outliers • Automatic Models with “Detectors” Outliers <0.01% chance likelihood observed values X Model Gaussian Rare Events Deviations in Counts or Values Unusual vs. peers = = = “responsetime by host” “count by error_type” “rare by EventID” “rare by process” “sum(bytes) over client_ip”
  • 22. Use Case 1: Find metrics deviation in time series • Automatic periodicity
  • 23. Use Case 2: Find Important IDS/IPS Events Challenge: How do you find the signs of advanced threats amid thousands of daily high-severity alerts?  Difficulty of creating effective rules results in a high false positive rate  Advanced Evasion Techniques (AETs) well-known to attackers
  • 24. Use Case 2: Find Important IDS/IPS Events Solution: Let machine learning filter out normal ‘noise’ and identify unusual counts, signatures, protocols and destinations by source • Anomaly Detective generates a dozen or so alerts per week • Accuracy & alert detail enable faster determination of threat level I like AD because I haven’t had to tune a single IDS rule since it was deployed. - Craig Merchant, Senior Security Architect, Oracle
  • 25. Use Case 3: Detect DNS Tunneling Activity Challenge: How do you detect DNS Tunneling (C2, data exfiltrations or other abuses of DNS) ?  Encrypted messages disguised as subdomains can contain control or data payloads  Insufficient monitoring of DNS for ‘tunneling’ activity poses a significant risk Calculated information content= 3126 Deviations in Counts or Values
  • 26. Use Case 3: Detect DNS Tunneling Activity What impresses me about Anomaly Detective is its ability to automatically find anomalous behavior in machine data by relying on trends in the data itself instead of hard-coding rules. - Peter Davis, CTO, Turnberry Solutions Solution: By detecting anomalies in DNS query subdomain characteristics
  • 27. • Use Case: Learn typical processes on each host • Find rare processes that “start up and communicate” Use Case 3: Rare Items as Anomalies Rare Events
  • 28. Finds FTP process running for 3 hours on system that doesn’t normally run Use Case 4: Rare Items as Anomalies = “rare by process”
  • 29. Use Case 5: Population / Peer Outliers • Host sending 20,000 requests/hours • Attempt to hack an IIS webserver = “sum(bytes) over host” Unusual vs. peers
  • 30. Adding Value to existing SIEM • Better results than threshold based searches • Example: “Unusual AD access” • SIEM: 148 notables/day • Anomaly Detection: 2 significant anomalies/week (500x reduction) • Example: “Proxy Data Exfiltration” • SIEM: sum(bytes_out) > 10MB => 50,000 notables/month • Anomaly Detection: 12 significant anomalies, including exfiltrations <10 MB • More sophisticated anomaly detection • Example: DNS Tunneling, Malware Command & Control Activity Value – Less time/effort for humans to triage Value – Reduce risk by detecting APTs, malware, rogue users that otherwise go unnoticed
  • 31. Additional Security Applications No. Threat Indicator Category Identify… …By Finding Anomalies In 1 Data Exfiltration Credit card numbers, Electronic Health Records being stolen Firewall Logs, Web Proxy Logs, Secure Web Gateway Logs, DNS Logs 2 Malware Command & Control Activity Infected systems beaconing Web Proxy Logs, DNS Request Logs, Firewall Logs 3 Suspicious Account Activity New account creation, privilege changes Server, Directory Logs, Audit Logs 4 Unauthorized Login Attempts/Activity Smart brute force attacks Server, Directory Logs, Audit Logs 5 Compromised Endpoints Spreading malware internally EDR/ AV logs, Netflow records 6 Suspicious Server Behaviors New bit torrents, chat rooms, file services Process starts, network connections 7 Unusual IDS/IPS Events Unusual security events from security tools IDS/IPS/IDP/NGFW logs 8 Unusual Network Activity Launching DDoS attack, excessive DNS requests Firewall Logs, Web Proxy Logs, Secure Web Gateway Logs, Netflow records, DPI Logs 9 Abusive/Attacking IP Addresses External data scrapers, internal snoopers Firewall Logs, Web Proxy Logs, Secure Web Gateway Logs, Netflow records, DPI Logs 10 Disabled/Interrupted Logging Attempts to hide tracks All types of log data
  • 32. SANS: “Organizations Need To Understand Their Environment And What Constitutes Normal And Abnormal Behavior, Train Staff On How To Use Analytic Tools And Define The Data They Need To Collect.”[1] [1] Analytics and Intelligence Survey 2014, a SANS Survey, Written by David Shackleford, October 2014 , p8. http://www.sans.org/reading-room/whitepapers/analyst/analytics-intelligence- survey-2014-35507 [2] http://digital-forensics.sans.org/media/poster_2014_find_evil.pdf [2]
  • 33. Summary Advantages of ITOA • Reduces mean-time-to repair (MTTR) and Avoids downtime • Increases insights into correlation of end-user interaction and business activity • Reduces operations cost with the efficient use of skilled personal • Applies pattern and statistics based algorithms • Helps in extracting meaningful information