Data Analytics for Security
Intelligence
Camil Demetrescu
Dept. Computer, Control, and Management
Engineering
Credits: Peter Wood, First Base Technologies LLP
Data Driven Innovation Rome 2016 – Open Summit
Roma Tre University, May 20 2016
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 2
Big data
Every day, we create 2.5 quintillion bytes of data.
90% of the data in the world today has been created in the
last two years alone.
http://www-01.ibm.c/software/data/bigdata/
2.5 quintillion = 2.5 exabytes = 2.5 x 1018 =
2.500.000.000.000.000.000 bytes
•  Sensors used to gather climate information
•  Posts to social media sites
•  Digital pictures and videos
•  Purchase transaction records
•  Cell phone GPS signals
20/5/2016Data Driven Innovation Rome 2016 Page 3
20/5/2016Data Driven Innovation Rome 2016 Page 4
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 5
Malware events per hour
20/5/2016Data Driven Innovation Rome 2016 Page 6
Organisations on average are
experiencing malware-related
activities once every three
minutes.
Receipt of a malicious email, a
user clicking a link on an
infected website, or an infected
machine making a call back to a
command and control server.
FireEyeAdvancedThreatReport2012
How breach occurred
20/5/2016Data Driven Innovation Rome 2016 Page 7
The Post Breach Boom, Ponemon Institute 2015
Survey of 3,529 IT and IT security practitioners
When the breach was discovered
20/5/2016Data Driven Innovation Rome 2016 Page 8
The Post Breach Boom, Ponemon Institute 2015
Survey of 3,529 IT and IT security practitioners
Reasons for failing to prevent the breach
20/5/2016Data Driven Innovation Rome 2016 Page 9
ThePostBreachBoom,PonemonInstitute2015
Surveyof3,529ITandITsecuritypractitioners
Extrapolated cost of breach
20/5/2016Data Driven Innovation Rome 2016 Page 10
ThePostBreachBoom,PonemonInstitute2015
Surveyof3,529ITandITsecuritypractitioners
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 11
Data driven information security: examples
20/5/2016Data Driven Innovation Rome 2016 Page 12
•  Analyze system/applications log files
•  Analyze network traffic
•  Identify anomalies and suspicious activities
•  Correlate multiple sources of information into a
coherent view
Why do we need big data systems?
20/5/2016Data Driven Innovation Rome 2016 Page 13
•  System Log files that can grow by gigabytes per
second
•  Network data captures, which can grow by 10s of
gigabytes per second
•  Intrusion Detection/Protection log files that can
grow by 10s of gigabytes per second
•  Application Log files that can grow by gigabytes per
second
http://www.virtualizationpractice.com/big-data-security-tools-22075/
Traditional scenarios
Traditional defences:
•  Signature-based anti-virus
•  Signature-based IDS/IDP
•  Firewalls and perimeter devices
Traditional approach:
•  Data collection for compliance
•  Check-list mindset
•  Tactical thinking
20/5/2016Data Driven Innovation Rome 2016 Page 14
New challenges
Complex threat landscape:
•  Stealth malware
•  Targeted attacks
•  Social engineering
New technologies and challenges:
•  Social networking
•  Cloud
•  BYOD / consumerisation
•  Virtualisation
20/5/2016Data Driven Innovation Rome 2016 Page 15
Conventional vs. advanced approaches
20/5/2016Data Driven Innovation Rome 2016 Page 16
http://www.emc.com/collateral/industry-overview/sbic-rpt.pdf
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 17
Data-driven information security:
early times
20/5/2016Data Driven Innovation Rome 2016 Page 18
•  Bank fraud detection and anomaly-based intrusion
detection systems.
•  Credit card companies have conducted fraud
detection for decades.
•  Custom-built infrastructure to mine big data for fraud
detection was not economical to adapt for other
fraud detection uses (healthcare, insurance, etc.)
Cloud Security Alliance
Data analytics for intrusion detection
20/5/2016Data Driven Innovation Rome 2016 Page 19
Intrusion detection systems – Security architects
realized the need for layered security (e.g., reactive
security and breach response) because a system
with 100% protective security is impossible.
1st
generation
2nd
generation
Security information and event management (SIEM)
– aggregate and filter alarms from many sources
and present actionable information to security
analysts.
3rd
generation
Big data analytics in security (2nd generation SIEM)
– correlating, consolidating, and contextualizing
diverse security event information, correlating long-
term historical data for forensic purposes
How can big data analytics help?
•  Advanced persistent threat (APT) detection?
•  Integration of IT and physical security?
•  Predictive analysis
•  Real-time updates
•  Behaviour models
•  Correlation
•  … advising the analysts?
•  … active defence?
20/5/2016Data Driven Innovation Rome 2016 Page 20
How can big data analytics help?
20/5/2016Data Driven Innovation Rome 2016 Page 21
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 22
Big data security challenges
•  Bigger data = bigger breaches?
•  New technology = security later?
•  Information classification
•  Information ownership (outputs and raw data)
•  Big data in cloud + BYOD = more problems?
20/5/2016Data Driven Innovation Rome 2016 Page 23
Big data security risks
•  New technology will introduce new vulnerabilities
•  Attack surface of the nodes in a cluster may not have been
reviewed and servers adequately hardened
•  User authentication and access to data from multiple
locations may not be sufficiently controlled
•  Regulatory requirements may not be fulfilled, with access to
logs and audit trails problematic
•  Significant opportunity for malicious data input and
inadequate data validation
20/5/2016Data Driven Innovation Rome 2016 Page 24
Big data privacy concerns
•  De-identifed information may be re-identified
•  Possible deduction of personally identifiable information
•  Risk of data breach is increased
•  "Creepy" Factor: consumers may feel that companies
know more about them than they are willing to volunteer
•  Big brother: predictive policing and tracking potential
terrorist activities. Harm individual rights or deny
consumers important benefits (such as housing or
employment) in lieu of credit reports.
http://www.ftc.gov/public-statements/2012/03/big-data-big-issues
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 26
Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 27
•  As with all new technologies, security in big data use
cases seems to be an afterthought at best
•  Big data breaches will be big too, with even more
serious reputational damage and legal repercussions
•  All organisations need to invest in research and study of
the emerging big data security analytics landscape
•  Big data has the potential to defend against advanced
threats, but requires a big re-think of approach
•  Relevant skills are key to successful deployment, only the
largest organisations can invest in this now
Big data to collect
•  Logs
•  Network traffic
•  IT assets
•  Sensitive / valuable information
•  Vulnerabilities
•  Threat intelligence
•  Application behaviour
•  User behaviour
20/5/2016Data Driven Innovation Rome 2016 Page 28

More Related Content

PDF
Ingesting click events for analytics
PPTX
Big-Data Computing on the Cloud
PDF
Data Analyst: il top player che tutti desiderano in azienda
PPTX
Data Science Courses - BigData VS Data Science
PPTX
Big data characteristics, value chain and challenges
PDF
Steps towards a Data Value Chain
PPTX
Building Innovative Data Products in a Banking Environment
PDF
Fundamentals of Big Data in 2 minutes!!
Ingesting click events for analytics
Big-Data Computing on the Cloud
Data Analyst: il top player che tutti desiderano in azienda
Data Science Courses - BigData VS Data Science
Big data characteristics, value chain and challenges
Steps towards a Data Value Chain
Building Innovative Data Products in a Banking Environment
Fundamentals of Big Data in 2 minutes!!

What's hot (19)

PDF
NewMR 2016 presents: 9 Big Applications of Big Data
PPTX
The big data value chain r1-31 oct13
PPTX
Data Science Innovations : Democratisation of Data and Data Science
PPT
Real time analytics of big data
PPTX
Data Mining With Big Data
KEY
Big Data Trends
PPTX
A Brief History of Big Data
PDF
Big Data analytics
PPT
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
PPTX
A Short History of Big Data
PDF
Designing experiences for the personal data box
PPTX
Big data Presentation
PPTX
An Introduction to Big Data
PDF
Smmart for partners
PPTX
Big Data & Implementasinya
PPTX
Datamarket: A Start-Up that will Change the World (with Open Data)
PPTX
PDF
L18 Big Data and Analytics
NewMR 2016 presents: 9 Big Applications of Big Data
The big data value chain r1-31 oct13
Data Science Innovations : Democratisation of Data and Data Science
Real time analytics of big data
Data Mining With Big Data
Big Data Trends
A Brief History of Big Data
Big Data analytics
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
A Short History of Big Data
Designing experiences for the personal data box
Big data Presentation
An Introduction to Big Data
Smmart for partners
Big Data & Implementasinya
Datamarket: A Start-Up that will Change the World (with Open Data)
L18 Big Data and Analytics
Ad

Viewers also liked (20)

PDF
Big data e prevenzione. Verso un minority report per gli incidenti
PDF
Network visualization for financial crime detection
PDF
BigData: una nuova fonte per la ricerca storica
PPTX
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
PPTX
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
PDF
Open data e dintorni
PDF
Mining the web to make hidden agricultural research globally discoverable: th...
PDF
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
PDF
Dealing with climate complexity: from climate data to information
PDF
Data Governance at work
PDF
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
PPT
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
PDF
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
PDF
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
PDF
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
PPTX
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
PDF
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
PPT
Netadminpres
PPTX
Security analytics
PDF
Performing network security analytics
Big data e prevenzione. Verso un minority report per gli incidenti
Network visualization for financial crime detection
BigData: una nuova fonte per la ricerca storica
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Open data e dintorni
Mining the web to make hidden agricultural research globally discoverable: th...
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
Dealing with climate complexity: from climate data to information
Data Governance at work
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Netadminpres
Security analytics
Performing network security analytics
Ad

Similar to Data Analytics for Security Intelligence (20)

PPTX
Advanced threat protection and big data
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Big Data Analytics
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PPTX
Big data security the perfect storm
PDF
Data foundation for analytics excellence
PDF
Big Data Analytics to Enhance Security
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PDF
Ictam big data
PPTX
The REAL Impact of Big Data on Privacy
PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
Big Data Dectives
PDF
The Rise of Big Data and the Chief Data Officer (CDO)
PDF
Big Data and Information Security
PPTX
Introduction to big data
PDF
Simon Thomas - Big Data: New Opportunity, New Risk
PDF
El contexto de la integración masiva de datos
PDF
Karim Baina Assises AUSIM 2016
PDF
Kind of big data in info sec
Advanced threat protection and big data
Big Data and Security - Where are we now? (2015)
Big Data Analytics
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
Big data security the perfect storm
Data foundation for analytics excellence
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Ictam big data
The REAL Impact of Big Data on Privacy
Delivering Security Insights with Data Analytics and Visualization
Big Data Dectives
The Rise of Big Data and the Chief Data Officer (CDO)
Big Data and Information Security
Introduction to big data
Simon Thomas - Big Data: New Opportunity, New Risk
El contexto de la integración masiva de datos
Karim Baina Assises AUSIM 2016
Kind of big data in info sec

More from Data Driven Innovation (20)

PDF
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
PDF
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
PDF
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
PDF
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
PDF
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
PDF
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
PDF
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
PDF
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
PDF
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
PDF
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
PPTX
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
PDF
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
PDF
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
PDF
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
PDF
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
PDF
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
PDF
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
PDF
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
PDF
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
PDF
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...

Recently uploaded (20)

PDF
American Journal of Multidisciplinary Research and Review
PDF
Lesson 1 - intro Cybersecurity and Cybercrime.pptx.pdf
PDF
book-34714 (2).pdfhjkkljgfdssawtjiiiiiujj
PPTX
Sheep Seg. Marketing Plan_C2 2025 (1).pptx
PDF
Buddhism presentation about world religion
PPTX
Stats annual compiled ipd opd ot br 2024
PPT
Classification methods in data analytics.ppt
PDF
NU-MEP-Standards معايير تصميم جامعية .pdf
PPT
What is life? We never know the answer exactly
PPTX
ISO 9001-2015 quality management system presentation
PDF
General category merit rank list for neet pg
PPTX
PPT for Diseases (1)-2, types of diseases.pptx
PPTX
cyber row.pptx for cyber proffesionals and hackers
PPTX
Transport System for Biology students in the 11th grade
PDF
9 FinOps Tools That Simplify Cloud Cost Reporting.pdf
PDF
Mcdonald's : a half century growth . pdf
PPTX
Fkrjrkrkekekekeekkekswkjdjdjddwkejje.pptx
PDF
Q1-wK1-Human-and-Cultural-Variation-sy-2024-2025-Copy-1.pdf
PPTX
Overview_of_Computing_Presentation.pptxxx
PPTX
Capstone Presentation a.pptx on data sci
American Journal of Multidisciplinary Research and Review
Lesson 1 - intro Cybersecurity and Cybercrime.pptx.pdf
book-34714 (2).pdfhjkkljgfdssawtjiiiiiujj
Sheep Seg. Marketing Plan_C2 2025 (1).pptx
Buddhism presentation about world religion
Stats annual compiled ipd opd ot br 2024
Classification methods in data analytics.ppt
NU-MEP-Standards معايير تصميم جامعية .pdf
What is life? We never know the answer exactly
ISO 9001-2015 quality management system presentation
General category merit rank list for neet pg
PPT for Diseases (1)-2, types of diseases.pptx
cyber row.pptx for cyber proffesionals and hackers
Transport System for Biology students in the 11th grade
9 FinOps Tools That Simplify Cloud Cost Reporting.pdf
Mcdonald's : a half century growth . pdf
Fkrjrkrkekekekeekkekswkjdjdjddwkejje.pptx
Q1-wK1-Human-and-Cultural-Variation-sy-2024-2025-Copy-1.pdf
Overview_of_Computing_Presentation.pptxxx
Capstone Presentation a.pptx on data sci

Data Analytics for Security Intelligence

  • 1. Data Analytics for Security Intelligence Camil Demetrescu Dept. Computer, Control, and Management Engineering Credits: Peter Wood, First Base Technologies LLP Data Driven Innovation Rome 2016 – Open Summit Roma Tre University, May 20 2016
  • 2. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 2
  • 3. Big data Every day, we create 2.5 quintillion bytes of data. 90% of the data in the world today has been created in the last two years alone. http://www-01.ibm.c/software/data/bigdata/ 2.5 quintillion = 2.5 exabytes = 2.5 x 1018 = 2.500.000.000.000.000.000 bytes •  Sensors used to gather climate information •  Posts to social media sites •  Digital pictures and videos •  Purchase transaction records •  Cell phone GPS signals 20/5/2016Data Driven Innovation Rome 2016 Page 3
  • 5. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 5
  • 6. Malware events per hour 20/5/2016Data Driven Innovation Rome 2016 Page 6 Organisations on average are experiencing malware-related activities once every three minutes. Receipt of a malicious email, a user clicking a link on an infected website, or an infected machine making a call back to a command and control server. FireEyeAdvancedThreatReport2012
  • 7. How breach occurred 20/5/2016Data Driven Innovation Rome 2016 Page 7 The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners
  • 8. When the breach was discovered 20/5/2016Data Driven Innovation Rome 2016 Page 8 The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners
  • 9. Reasons for failing to prevent the breach 20/5/2016Data Driven Innovation Rome 2016 Page 9 ThePostBreachBoom,PonemonInstitute2015 Surveyof3,529ITandITsecuritypractitioners
  • 10. Extrapolated cost of breach 20/5/2016Data Driven Innovation Rome 2016 Page 10 ThePostBreachBoom,PonemonInstitute2015 Surveyof3,529ITandITsecuritypractitioners
  • 11. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 11
  • 12. Data driven information security: examples 20/5/2016Data Driven Innovation Rome 2016 Page 12 •  Analyze system/applications log files •  Analyze network traffic •  Identify anomalies and suspicious activities •  Correlate multiple sources of information into a coherent view
  • 13. Why do we need big data systems? 20/5/2016Data Driven Innovation Rome 2016 Page 13 •  System Log files that can grow by gigabytes per second •  Network data captures, which can grow by 10s of gigabytes per second •  Intrusion Detection/Protection log files that can grow by 10s of gigabytes per second •  Application Log files that can grow by gigabytes per second http://www.virtualizationpractice.com/big-data-security-tools-22075/
  • 14. Traditional scenarios Traditional defences: •  Signature-based anti-virus •  Signature-based IDS/IDP •  Firewalls and perimeter devices Traditional approach: •  Data collection for compliance •  Check-list mindset •  Tactical thinking 20/5/2016Data Driven Innovation Rome 2016 Page 14
  • 15. New challenges Complex threat landscape: •  Stealth malware •  Targeted attacks •  Social engineering New technologies and challenges: •  Social networking •  Cloud •  BYOD / consumerisation •  Virtualisation 20/5/2016Data Driven Innovation Rome 2016 Page 15
  • 16. Conventional vs. advanced approaches 20/5/2016Data Driven Innovation Rome 2016 Page 16 http://www.emc.com/collateral/industry-overview/sbic-rpt.pdf
  • 17. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 17
  • 18. Data-driven information security: early times 20/5/2016Data Driven Innovation Rome 2016 Page 18 •  Bank fraud detection and anomaly-based intrusion detection systems. •  Credit card companies have conducted fraud detection for decades. •  Custom-built infrastructure to mine big data for fraud detection was not economical to adapt for other fraud detection uses (healthcare, insurance, etc.) Cloud Security Alliance
  • 19. Data analytics for intrusion detection 20/5/2016Data Driven Innovation Rome 2016 Page 19 Intrusion detection systems – Security architects realized the need for layered security (e.g., reactive security and breach response) because a system with 100% protective security is impossible. 1st generation 2nd generation Security information and event management (SIEM) – aggregate and filter alarms from many sources and present actionable information to security analysts. 3rd generation Big data analytics in security (2nd generation SIEM) – correlating, consolidating, and contextualizing diverse security event information, correlating long- term historical data for forensic purposes
  • 20. How can big data analytics help? •  Advanced persistent threat (APT) detection? •  Integration of IT and physical security? •  Predictive analysis •  Real-time updates •  Behaviour models •  Correlation •  … advising the analysts? •  … active defence? 20/5/2016Data Driven Innovation Rome 2016 Page 20
  • 21. How can big data analytics help? 20/5/2016Data Driven Innovation Rome 2016 Page 21
  • 22. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 22
  • 23. Big data security challenges •  Bigger data = bigger breaches? •  New technology = security later? •  Information classification •  Information ownership (outputs and raw data) •  Big data in cloud + BYOD = more problems? 20/5/2016Data Driven Innovation Rome 2016 Page 23
  • 24. Big data security risks •  New technology will introduce new vulnerabilities •  Attack surface of the nodes in a cluster may not have been reviewed and servers adequately hardened •  User authentication and access to data from multiple locations may not be sufficiently controlled •  Regulatory requirements may not be fulfilled, with access to logs and audit trails problematic •  Significant opportunity for malicious data input and inadequate data validation 20/5/2016Data Driven Innovation Rome 2016 Page 24
  • 25. Big data privacy concerns •  De-identifed information may be re-identified •  Possible deduction of personally identifiable information •  Risk of data breach is increased •  "Creepy" Factor: consumers may feel that companies know more about them than they are willing to volunteer •  Big brother: predictive policing and tracking potential terrorist activities. Harm individual rights or deny consumers important benefits (such as housing or employment) in lieu of credit reports. http://www.ftc.gov/public-statements/2012/03/big-data-big-issues
  • 26. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 26
  • 27. Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 27 •  As with all new technologies, security in big data use cases seems to be an afterthought at best •  Big data breaches will be big too, with even more serious reputational damage and legal repercussions •  All organisations need to invest in research and study of the emerging big data security analytics landscape •  Big data has the potential to defend against advanced threats, but requires a big re-think of approach •  Relevant skills are key to successful deployment, only the largest organisations can invest in this now
  • 28. Big data to collect •  Logs •  Network traffic •  IT assets •  Sensitive / valuable information •  Vulnerabilities •  Threat intelligence •  Application behaviour •  User behaviour 20/5/2016Data Driven Innovation Rome 2016 Page 28