PROACTIVE SNOOPING ANALYSIS

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Being Proactive and Less Reactive in Security Operations and Cyber Attack Response Christina Raftery, MCSE, CISSP FBI Los Angeles Field Office.
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
The Most Analytical and Comprehensive Defense Network in a Box.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Why SIEM – Why Security Intelligence??
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Proactive Incident Response
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cybersecurity - What’s Next? June 2017
Juniper Software-Defined Secure Network
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
A lustrum of malware network communication: Evolution & insights
Vikas Uberoy -Channel Director ANZ
Real-time protection for web sites and web apps against ATTACKS
Compliance with hardening standards
DISA Global Operations
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
DEFECT PREDICTION : USING MACHINE LEARNING
SECURITY INFORMATION AND EVENT MANAGEMENT

Myths About Web Application Security That You Need To Ignore.
5G Security Training
Combining the best of Audit and Penetration Testing
How to Learn Your Client
Varonis Overview.
Privacy Through Anonymous Connection and Browsing
How to Operationalize Big Data Security Analytics
The Discipline of Decision
Healthcare Cloud Security Stack for Microsoft Azure
Let’s go Threat Hunting
National Cyber Security
Working with Server-side Scripts
CRITICAL INFRASTRUCTURE CYBERSECURITY
Panda Adaptive Defense Platform and Services
12/6/2018 Honeypot ICT Infrastructure Sashan
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Security Overview: Honeypots
Maintaining order and safety in a city is no small task
Protecting your data with Azure AD
4/3/2019 8:56 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Detection Detect the breach and protect the data. By,
Honeypots Visit for more Learning Resources 1.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Security intelligence: solving the puzzle for actionable insight
Future of AIOps –GAVS View
CyberSecurity Strategy For Defendable ROI
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
What You Should Know About Driving Down MTTD and MTTR
Presentation transcript:

PROACTIVE SNOOPING ANALYSIS Abhishek G (Member Technical Staff) Deeksha Murthy (Senior QA Engineer) Aditya Kumar (Senior QA Engineer) First American India

Contents Abstract Introduction Problem Solution Conclusion References

Abstract Proactive Snooping Analysis Hackers of the modern days are more smart and skilled than ever before One of the largest breaches of classified information was carried out by an insider Offensive Countermeasures can hunt these threats

Introduction According to the 2015 Statistics, the breakdown of the breached targets by type of entity is as follows: Businesses were the target of 40% of the security breaches (312 breaches) Medical and Healthcare entities made up 35.4% of data breach target (276 breaches) Government or military targets made up 8.1% of cybersecurity breaches (63 breaches) Why did this happen? Whom to blame for this? How did this happen ?

Problem Delta Detection Detecting threats and adversaries on networks continues to be a problem for many organizations Alert fatigue: Alert fatigue is an enemy to detecting or hunting real, human adversaries on an organization’s systems Human Adversaries: At the other end of any bot, virus, or targeted attack there is a human Prioritization of Adversaries: what are we protecting and who are our adversaries? Are we prioritising it in right way?

Solution Threat Hunting Proactively and iteratively searching through networks and datasets to detect threats that evade existing automated tools  Intelligence-Driven Situational-Awareness Driven Analytics-Driven Incident Response An essential component of Threat Hunting The bigger result is achievable with hunting and Incident Response working together and in hand with each other

Threat Hunting

Attribution Dynamic Defense technique which, when combined with Threat Hunting will minimize the effects of a targeted attack Web Bug Server The Web Bug Server is essentially a command and control (C2) server for the defender MoleHunt If the Threat Hunter has a suspicion that there are leaks happening or potentially happening, Mole Hunt helps to narrow the focus Molehunt takes the simple Web Bug concept to the next level By leveraging a list an insider hunt drive can easily be built by feeding the list to a Python script

Web Bug Server

MoleHunt

Bots and machines are not the advanced challengers but humans are..! Conclusion Large scale data breaks have happened and will continue to happen unless the mindset of security practitioners change Bots and machines are not the advanced challengers but humans are..! Simply selecting through logs and alerts may be effective, but it does not lend to a proactive hunt of intrusions within or against an organization With Active Defence tools of Web Bug Server and Molehunt, the Hunter can go on the offense and proactively seek out insiders who might be leaking data, hopefully before any real data is leaked It is time to let the machines hunt the machines and humans hunt humans..!!

References & Appendix https://en.wikipedia.org https://www.sans.org https://sqrrl.com https://securityintelligence.com

Any Questions..?

Thank You!!! First American India Abhishek G (Member Technical Staff) Deeksha Murthy (Senior QA Engineer) Aditya Kumar (Senior QA Engineer) First American India