Pro-I Open Source Security Monitoring

Slides:



Advertisements
Similar presentations
Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Advertisements

Adam Jorgensen Pragmatic Works Performance Optimization in SQL Server Analysis Services 2008.
Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
Service Manager for MSPs
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Business Intelligence (BI) PerformancePoint in SharePoint 2010 Sayed Ali – SharePoint Administrator.
Transforming Business with Advanced Analytics: Introducing the New Intel® Xeon® Processor E7 v2 Family Seetha Rama Krishna Director, APAC HPC Solutions.
Software & Services Group Developer Products Division Copyright© 2013, Intel Corporation. All rights reserved. *Other brands and names are the property.
Technical BI Project Lifecycle
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
Microsoft Business Intelligence Gustavo Santade Business Intelligence Project Manager Improving Business Insight Building a cube using Analysis Services.
Connect with life Praveen Srvatsa Director | AsthraSoft Consulting Microsoft Regional Director, Bangalore Microsoft MVP, ASP.NET.
What is Business Intelligence? Business intelligence (BI) –Range of applications, practices, and technologies for the extraction, translation, integration,
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
SharePoint 2010 Business Intelligence Module 6: Analysis Services.
Intel - Public Get Rich or Get Thin: The Secure Client Jeff Moriarty, CISSP Security Program Manager Intel Information Risk and Security.
SharePoint 2010 Business Intelligence Module 2: Business Intelligence.
IBM Start Now Business Intelligence Solutions. Agenda Overview of BI Who will buy and why Start Now BI solution Benefit to customer.
Data Management Conference Introducing SQL Server 2008 R2 Mark Linton Director of WW Marketing SQL Server Business Group
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Frontiers in Massive Data Analysis Chapter 3.  Difficult to include data from multiple sources  Each organization develops a unique way of representing.
Results of self-organization in the service oriented team
Copyright© 2011, Intel Corporation. All rights reserved. *Other brands and names are the property of their respective owners. 1 How Does The Intel® Parallel.
Visit our Focus Rooms Evaluation of Implementation Proposals by Dynamics AX R&D Solution Architecture & Industry Experts Gain further insights on Dynamics.
Changing Developer Behavior Using Automatic Test Intel Agile and Lean Development Conference Chris Gearing 23 rd May 2014 Version 1.0.
1 Copyright © 2009, Oracle. All rights reserved. Oracle Business Intelligence Enterprise Edition: Overview.
Patrick Ortiz Global SQL Solution Architect Dell Inc. BIN209.
Datazen – an overview Frank Geisler Please Support Our Sponsors SQL Saturday is made possible with the generous support of these sponsors.
CMPE 226 Database Systems April 19 Class Meeting Department of Computer Engineering San Jose State University Spring 2016 Instructor: Ron Mak
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Microsoft PowerBI – Advanced Solutions with Microsoft Excel and PowerBI Presented by: Phillip Guglielmi, CPA | Senior BI Consultant and Solutions Architect.
WHY VIDEO SURVELLIANCE
Protecting a Tsunami of Data in Hadoop
Deployment Planning Services
Data Platform and Analytics Foundational Training
Data Platform and Analytics Foundational Training
Transform yourself and build your IT cloud career path
Convergence /6/2018 © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Presenter Date | Location
Leveraging the Business Intelligence Features in SharePoint 2010
Creating Enterprise Grade BI Models with Azure Analysis Services
Using a Gateway to Leverage On-Premises Data in Power BI
Overview of MDM Site Hub
Chris Menegay Sr. Consultant TECHSYS Business Solutions
Data Platform and Analytics Foundational Training
Microsoft Build /22/ :52 PM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY,
7/22/2018 9:21 PM BRK3270 Building a Better Data Solution: Microsoft SQL Server and Azure Data Services Joey D’Antoni Principal Consultant Denny Cherry.
Installation and database instance essentials
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
IBM DATASTAGE online Training at GoLogica
Using a Gateway to Leverage On-Premises Data in Power BI
Microsoft Build /20/2018 5:17 AM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY,
Power Apps & Flow for Microsoft Dynamics SL
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Modeling Parallelism with Intel® Parallel Advisor
How EMI Music Implemented Master Data Services with Adatis
Ch 4. The Evolution of Analytic Scalability
Microsoft Virtual Academy
12/26/2018 5:07 AM Leap forward with fast, agile & trusted solutions from Intel & Microsoft* Eman Yarlagadda (for Christine McMonigal) Hybrid Cloud – Product.
By Vipin Varghese Application Engineer (NCSD)
WHY VIDEO SURVELLIANCE
Data Warehousing Concepts
Business Intelligence
Microsoft Virtual Academy
Analytics, BI & Data Integration
Microsoft Data Insights Summit
Microsoft Virtual Academy
Implementing a Distributed Enterprise Architecture to Deliver BI
Presentation transcript:

Pro-I Open Source Security Monitoring Grant Babb Technical Program Manager Intel Information Risk and Security March 3, 2011

Legal Notices TThis presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.  Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions.  Any change to any of those factors may cause the results to vary.  You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.  For more complete information about performance and benchmark results, visit www.intel.com/benchmarks BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino Atom, Centrino Atom Inside, Centrino Inside, Centrino logo, Core Inside, FlashFile, i960, InstantIP, Intel, Intel logo, Intel386, Intel486, IntelDX2, IntelDX4, IntelSX2, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, Itanium, Itanium Inside, MCS, MMX, Oplus, OverDrive, PDCharm, Pentium, Pentium Inside, skoool, Sound Mark, The Journey Inside, Viiv Inside, vPro Inside, VTune, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. Copyright © 2011, Intel Corporation. All rights reserved. 2

Agenda Insider Threat: Yesterday, Today, and Tomorrow Pro-I : A Technical Overview Proactive Monitoring of Threats with Pro-I 2008 US Secret Service and Carnegie Mellon study on Insider Threat in IT and Telecom   49% of the cases involved leaving the company 76% were full-time employees of the affected organizations 63% of the insiders were employed in technical positions Insiders were a wide variety of ages and backgrounds

Insider Threat 2008 2008 US Secret Service and Carnegie Mellon study on Insider Threat in IT and Telecom: 49% of cases involved leaving the company 76% were full-time employees 63% employed in technical positions Wide variety of ages and backgrounds 37% were terminations, 12% were employment at a new company

Planned or unplanned, leaks are going to happen. Insider Threat Today High unemployment rate for the nation, negative employment rate for some jobs Engineers are actively recruited from their jobs Go to work at competitor, gather intel, then “Start your new job” Everyone could be an insider threat USB drives make a career portable Contacts, old slides, job collateral all mixed together The longer you’re there, the more likely the leak Compute continuum – using the cloud to share data across devices, mixing personal/private 37% were terminations, 12% were employment at a new company Planned or unplanned, leaks are going to happen.

Insider Threat Tomorrow Headcount in standalone IT roles will likely shrink to 25% or less of current totals by 2015 The Future of Corporate IT, 2010, Corporate Executive Board Almost 75% of employees would steal company secrets if they were fired and had clear plans to take something with them if they left. Imperva Survey in November 2010 Cloud traffic will be 33% of data centers by 2015 2011 Cisco Study By 2014, 90% of organizations will support corporate applications on personal devices. Gartner Top Predictions 2011 2008 US Secret Service and Carnegie Mellon study on Insider Threat in IT and Telecom   49% of the cases involved leaving the company 76% were full-time employees of the affected organizations 63% of the insiders were employed in technical positions Insiders were a wide variety of ages and backgrounds

Proactive Monitoring Benchmarked approaches to monitoring across different industries: Intrusion detection systems for networks Fraud detection systems for finance Balanced scorecards in BI Business Intelligence was selected as the approach Now an End-to-end capability around the solution (people/process/tools) known as Proactive Investigations (Pro-I) http://www.msteched.com/2010/NorthAmerica/BIC304 BI Conference 2010 Presentation Balanced scorecard was a better way to look at multiple risk indicators over a rule-based approach Successful benchmark of Risk Management concepts to BI Pro-I now has a GPL (GNU Public License) and both source and binaries will be available in CodePlex and other repositories in March

Paths and Components Collector Event Processor Data Warehouse ETL Loads events into a stream, stacks them into a queue, then streams the queue to the collector Event Processor Picks up queued event streams on remote servers, streams them into query engine, performs real-time continuous queries on the steams, then sends query streams to outputs (log files) Data Warehouse Stores billions of rows of security data, separated into multiple fact tables per source, each partitioned across multiple days. Fact tables include raw data plus added keys (date, hour, IP, location, etc) ETL Batch extract, transform, and loading of data to and from Data Warehouse, Cubes, and Reporting databases. Where possible, all extract, transform, and load occur in memory streams. Analytics Multidimensional structures are used to produce indicator matrix; cubes are organized by system risk model, are processed at least once daily, models are queried and results loaded into Reporting Reporting Used to store point-in-time indicator results for fast retrieval in analyst module Parallel Query Lightweight tool designed to maximize query performance for drilldown information. Uses multi-threaded architecture to query individual fact tables; expensive correlation and duplicate removal are done in memory via C# instead of SQL Pro-I Analyst Big data visualization, drilldown integration, and case management (workflow) all combined in one UI. Current version enables easy comparison and pattern analysis of over 25,000 data points at a time

Paths and Components Real-Time Path Analytics Path Collector WinOS File Share SQL Real-Time Path Events queue Event Processor Data Warehouse Analytics Reporting ETL ETL ETL batch batch batch Events queue Analytics Path Transaction SysA SysB Domain Controller Context HR Sec Incidents IP Location Data Warehouse Analytics Reporting ETL ETL ETL batch batch batch SQL query SQL Analyst UI query Parallel Query

Real-Time File Protection 1) Windows service installed on local server – queries event stream, pulls key fields out of each event and stacks smaller events on a queue listening on a port. 5) Complex event (“who deleted what”) is sent to alert output adapter which transforms event to email format 3) Input adapters connect to remote ports and queues events Into an input stream 6) All simple events are sent to CSV output adapter to spool to flat files, later loaded to DW and used by analytics 2) Windows service installed on remote server – watches network file shares and returns change event notifications. These are put into an event queue listening on a port. 4) Query combines events from two event streams (file delete, logon/logoff) to create complex event

Threats Become Indicators ! Entitled Engineer Ambitious Alpha $ Well-Informed Sys-Admin ? Settled-In Spy * Worker Data IP System Remote Access Domain Access Leaving Unusual/Excessive Access Excessive Upload/Download Unusual/Excessive Systems Technical Role Unusual/Excessive Hours Non-technical Role Access Denied ! $ ? ! ! $ ? ! ? ! $ ! ? ? $ $ $ ?

Multidimensional Models Problem #1: Log time is often different from the time of access. We need to utilize local time for our risk model, but different geo’s make local time complex Solution #1: Use an employee database that gives you location, an intermediate table to lookup GMT offset for that location, and calculate local time from both lookups Problem #2: How do we implement statistical measures of access? Not everyone accesses a system the same way, we could create a lot of false positives or false negatives by choosing the wrong approach. Solution #2: Create measures based on average and standard deviation, but slice it by the individual user. This gives you measures that compare access records to the pattern of the individual , not the whole user population. Problem # 3: There are limitations with how many different ways you can slice data. To answer many questions with only one MDX query can mean impossible fact tables, dimensions, or both. Solution # 3: Simplify your fact tables and dimensions for performance, use multiple MDX queries and combine them later in a reporting component.

Indicators Become Visualization

Implementing Pro-I Pro-I Collector can be implemented on VM’s or application servers Scale-out architecture, dependent on event streams and number of queries Skill needed: LINQ to write new query templates Pro-I Analytics requires dedicated hardware for Data Warehouse and Analysis components Scale-up: depending on event volume and response time Scale-out: parallel logic can use multiple SMP or one MPP Skill needed: ETL design for optimal loading, MDX for custom queries, BI design for worker context Pro-I Investigator tools are best on 64-bit clients Scale-up: may not be necessary Skill needed: InfoSec Investigator or Security Analyst

Conclusion Look for initial release in March Drafting press release and implementation guide Plan to publish Investigator’s Guide in 2012 Active Development will continue in 2012 Research partners for threat detection Still an enterprise solution at Intel Looking at possibilities in the Cloud Participation in development is welcome Opportunity to influence the security community to gain more insight on insider threat, whether malicious or unintentional Grant.Babb@Intel.com

Questions?