SlideShare a Scribd company logo
SESSION ID:
#RSAC
Dr. Anton Chuvakin
Demystifying Security Analytics:
Data, Methods, Use Cases
AIR-T09
@anton_chuvakin
Research VP
Gartner for Technical Professionals
#RSAC
Easy, Huh?
Security analytics is very easy:
1. Get data.
2. Process with algorithms.
3. Enjoy the insights!
#RSAC
1. Defining “SECURITY ANALYTICS”
2. Choosing your road to security analytics success
3. Tooling up for security analytics: myth and reality
4. Best practices for security analytics?
Outline
#RSAC
Detect threat better — and
detect "better" threats!
Decide what matters, prioritize
alerts and signals.
Triage alerts faster.
Solve (some) security
problems with less expert
labor.
A Little Motivation: Why Security Analytics?
Beware of overhyped tools!
#RSAC
Manual way
How many attempts constitute malicious password guessing?
3? 5? 10? 100?
Within 1 second? 1 minute? 10 minutes?
How to write a rule here?
Data-driven / analytics way
Run ML on your data, learn from past malicious cases, update models
WIN!
Example: Password Guessing
#RSAC
What Is Security Analytics?
#RSAC
Security analytics = Some advanced analysis of some data to achieve some
useful security outcome!
Q: What is advanced?
A: Anything better than "known good/known bad" rule matching and basic statistics
(like "if 10% above average, alert"). Not only machine learning!
Q: What data, specifically?
A: Really, any data: From logs to flows/sessions, from transactions to various context
on users, such as HR data, etc.
Definition Drill-Down
#RSAC
Still Mystified?
#RSAC
Data/Methods/Use cases:
What data is
being analyzed?
What methods and
algorithms are
being used?
What specific problems
are being solved?
Analytics Demystifying Framework!
Data sources: What data is being analyzed?
Methods: What algorithms are being applied?
Use cases: What problem is being solved?
#RSAC
Example: DLP Alert Prioritization
Data/Methods/Use cases:
What data is being analyzed? - DLP alerts, user identity context, data
access logs
What methods and algorithms are being used? – PCA to find out
which dimensions of the alert matter and how much
What specific problems are being solved? – Identifying which alerts
indicate significant and dangerous data theft
#RSAC
Starting Your Security Analytics Journey
#RSAC
1. Analytic, data-driven mindset (!)
2. Willingness to explore data
3. Ability to collect and retain data (SIEM helps — isn't a must)
4. Some understanding of data science approaches
5. Availability of people to use the tools, prepare the data and refine
the questions
Security Analytics Key Success Factors
#RSAC
Analytic mindset seems to determine the success of analytics and big
data initiatives for security more than anything else!
Really, A Mindset??!
Are you a data explorer or an appliance buyer ("OOBster")?
Would you look at your data or at your vendor for answers?
Must you have out-of-the-box content (rules, signatures, etc.)
for everything?
Do you accept that data may have the answers, not the gut feel?
#RSAC
Products or People: Buy, Build, Partner
#RSAC
Before You Buy!
Does it say
BUY THE WRONG PRODUCT
anywhere?
#RSAC
Pros:
Solve at least some problems
immediately upon installation
Solve select problems
automatically, without tuning
Cons:
Risk of limited applicability of
the tool beyond specific use
cases
Rely on vendor to pick and
solve problems
Buy Choice
#RSAC
Pros:
Leads to development of the
capability that can be used to
solve future problems
Focus resources on
organization-specific problem
Cons:
Extensive effort to build and
then mature an analytic
capability
Skills requirements
uncommon for IT
organizations
(statistics, etc.)
Build Choice
#RSAC
Start with DATA
Explore data to find and solve
PROBLEMS
Grow SKILLS to identify other
useful problems and solve
them
RETAIN KNOWLEDGE and
grow analytics capability
Start with PROBLEM AT HAND
Find the right DATA to solve it
Try different ALGORITHMS,
tuning the data too
LEARN and solve next problem
better
LOOK at other data and
problems
How to Avoid “Science Project” Syndrome?
#RSAC
Pros:
Leads to development of the
customized capability
Leverages vendor/provider
expertise gained from
previous projects
Cons:
Longer time to value
compared to off-the-shelf
products
High cost of specialty
consulting labor
Partner Choice
#RSAC
However … even if you decide to buy, you may still need to build and
definitely tune (both initially and over time!)
Warning: Buy Is Often "Buy Then Build"?
Buy advantages:
Solve at least some problems within 30 days after deployment
Solve select problems automatically, without much tuning
Supported commercial product may be more comforting to security leaders
Rely on vendor expertise with algorithms and statistics; vendor can employ scientists
and statisticians
#RSAC
Tooling Up
#RSAC
There is no one "security analytics market."
There is no specific "security analytics technology."
(and no "big data security analytics technology").
Security analytics is a concept!
Several types of very different commercial tools use it.
You can also build your own tools — and use OSS
heavily:
Ever heard of Hadoop? ELK stack? R?
Tools: The Mythology Edition
#RSAC
1. User behavior analytics (UBA, sometimes UEBA for “entity”)
2. Network traffic analysis (NTA, not a common name yet)
… and also:
Broad-scope data analysis tools with solid and proven security
use cases
Tools: The Reality Edition
#RSAC
But Wait … Where Is SIEM?
Source: Gartner (May 2015)
Requirement Likely tool type to use
Collect log data for compliance, run reports Log management
Perform near-real-time security correlation SIEM
Detect user anomalies and solve other typical
data-intensive problems
UBA or other commercial tool
Solve organization-specific data intensive
problems; collect and analyze diverse data
types at high volume
Custom-built big data security platform
#RSAC
UBA or UEBA: What's Inside the Box?
Details Example
Data Logs (from SIEM or directly), DLP
alerts, flows, network metadata,
IAM data, HR data, etc.
System authentication logs and Active
Directory user information.
Methods Supervised machine learning,
unsupervised learning, statistical
modeling, etc.
Self-to-self comparison, peer
comparison and activity model
vs. time.
Use cases Compromised account detection,
predeparture data theft, employee
sabotage, shared account abuse, etc.
Detect account takeover by a malicious
external attacker.
#RSAC
Compromised Accounts
Found
Departing Users Stealing IP
Geolocation Anomaly
Anomalous Behavior in
VPN Activity
Customer Service Rep.
Privacy Breaches
Source Code Compromised
Compromised System
Behavior
Retired Devices Still
in Service
Unauthorized Access to
Patient Records
Privileged Accounts Shared
Example UBA Tool Wins!
#RSAC
Network Traffic Analysis: What's Inside the Box?
Details Example
Data Flows data and network session
metadata (to Layer 7), payload data;
flows DNS and WHOIS data as context.
Application layer traffic data
coupled with WHOIS domain
registration data.
Methods Supervised machine learning,
clustering, network modeling, etc.
Network activity model over time,
traffic volume model by protocol, etc.
Use cases Data exfiltration, attacker lateral
movement within the network and
malware spreading.
Detect data exfiltration by the attacker
based on traffic volume per protocol
per use model.
#RSAC
1. SIEM collectors feed SIEM and Hadoop (some direct data collection
into Hadoop):
One data repository for everything ("data lake")
2. Selective data structuring (Hadoop to MongoDB and PostgreSQL):
Tableau fed fromPostgres, custom tools fed from Mongo
Also, Solr runs off Hadoop
3. Shared data scientist pool (+ 1 "security data scientist")
4. Visualization and query tools built for junior analysts
One Implementation: How They Did It?
#RSAC
Not Yet!
#RSAC
 Given an early stage of these technologies, tool acquisition needs to be
targeted at specific problems because there are no "general security analytics
tools" on sale. (BUY route)
 There is not enough data on the comparative effectiveness of various analytic
approaches and algorithms (implemented in vendor tools) versus real-world
problems. (BUY route)
 Think of the problems first, target purchases at problems, do validate that the
vendor of choice has a record of solving such problems. (BUY route)
 Think of the data first, and start exploring, then bring tools and components as
needed (BUILD route)
Recommendations
#RSAC
 Make the commercial tools EASY TO TEST and PROVE VALUE
 Evolve analytics tools to ALGORITHM PORTABILITY
 Create CATALOGUE of USE CASES where various analytics tools
work well IN REAL WORLD
 Add more BRAINPOWER to all security tools!
INDUSTRY CALL TO ACTION!

More Related Content

What's hot (18)

PPTX
SOC 3.0: strategic threat intelligence May 2016
Sarah Bark
 
PDF
IOCs Are Dead—Long Live IOCs!
Priyanka Aash
 
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Priyanka Aash
 
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
ReZa AdineH
 
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect
 
PDF
Dreaming of IoCs Adding Time Context to Threat Intelligence
Priyanka Aash
 
PPTX
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
PDF
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
Priyanka Aash
 
PDF
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
PPTX
Operational Security Intelligence
Splunk
 
PDF
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
 
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
 
PDF
Realities of Data Security
Priyanka Aash
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
 
PPTX
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
SOC 3.0: strategic threat intelligence May 2016
Sarah Bark
 
IOCs Are Dead—Long Live IOCs!
Priyanka Aash
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Priyanka Aash
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
ReZa AdineH
 
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect
 
Dreaming of IoCs Adding Time Context to Threat Intelligence
Priyanka Aash
 
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Applying Auto-Data Classification Techniques for Large Data Sets
Priyanka Aash
 
How To Avoid The Top Ten Software Security Flaws
Priyanka Aash
 
Operational Security Intelligence
Splunk
 
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
 
Realities of Data Security
Priyanka Aash
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
 
Security Operations Center (SOC) Essentials for the SME
AlienVault
 

Viewers also liked (20)

PDF
Yirgacheffe Chelelelktu Washed Coffee 2015
Golden Future Trading Ltd
 
PPTX
Security For Humans
conjur_inc
 
PPT
Introduction to smpc
Cysinfo Cyber Security Community
 
PDF
AWS + Puppet = Dynamic Scale
Shiva Narayanaswamy
 
PDF
Evolution of OPNFV CI System: What already exists and what can be introduced
OPNFV
 
PPTX
Expect the unexpected: Anticipate and prepare for failures in microservices b...
Bhakti Mehta
 
PPTX
Reversing malware analysis training part3 windows pefile formatbasics
Cysinfo Cyber Security Community
 
PDF
Java standards in WCM
Paolo Mottadelli
 
PPTX
NSM (Network Security Monitoring) - Tecland Chapeco
Rodrigo Montoro
 
PPTX
Developing highly scalable applications with Symfony and RabbitMQ
Alexey Petrov
 
PPTX
Hangul
stepupias
 
PPT
Jake Fox Pd. 5
LigScience2
 
PPTX
Apache Ambari: Managing Hadoop and YARN
Hortonworks
 
DOC
Gaurav dev ops (AWS, Linux, Automation-ansible, jenkins:CI and CD:Ansible)
Gaurav Srivastav
 
PDF
Automated Infrastructure Security: Monitoring using FOSS
Sonatype
 
PDF
Platform - Technical architecture
David Rundle
 
PDF
Linux Malware Analysis
Cysinfo Cyber Security Community
 
PPTX
Python Pants Build System for Large Codebases
Angad Singh
 
PDF
Chicago AWS user group meetup - May 2014 at Cohesive
AWS Chicago
 
Yirgacheffe Chelelelktu Washed Coffee 2015
Golden Future Trading Ltd
 
Security For Humans
conjur_inc
 
Introduction to smpc
Cysinfo Cyber Security Community
 
AWS + Puppet = Dynamic Scale
Shiva Narayanaswamy
 
Evolution of OPNFV CI System: What already exists and what can be introduced
OPNFV
 
Expect the unexpected: Anticipate and prepare for failures in microservices b...
Bhakti Mehta
 
Reversing malware analysis training part3 windows pefile formatbasics
Cysinfo Cyber Security Community
 
Java standards in WCM
Paolo Mottadelli
 
NSM (Network Security Monitoring) - Tecland Chapeco
Rodrigo Montoro
 
Developing highly scalable applications with Symfony and RabbitMQ
Alexey Petrov
 
Hangul
stepupias
 
Jake Fox Pd. 5
LigScience2
 
Apache Ambari: Managing Hadoop and YARN
Hortonworks
 
Gaurav dev ops (AWS, Linux, Automation-ansible, jenkins:CI and CD:Ansible)
Gaurav Srivastav
 
Automated Infrastructure Security: Monitoring using FOSS
Sonatype
 
Platform - Technical architecture
David Rundle
 
Linux Malware Analysis
Cysinfo Cyber Security Community
 
Python Pants Build System for Large Codebases
Angad Singh
 
Chicago AWS user group meetup - May 2014 at Cohesive
AWS Chicago
 
Ad

Similar to Demystifying Security Analytics: Data, Methods, Use Cases (20)

PPTX
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
PDF
Changing the Security Monitoring Status Quo
EMC
 
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
Interset
 
PDF
Implementing An Automated Incident Response Architecture
Priyanka Aash
 
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
PDF
Creating Order from Chaos: Metrics That Matter
Priyanka Aash
 
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Felipe Prado
 
PPTX
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
PDF
Visualization in the Age of Big Data
Raffael Marty
 
PDF
Applied cognitive security complementing the security analyst
Priyanka Aash
 
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
Enterprise Management Associates
 
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Priyanka Aash
 
PDF
Next generation security analytics
Christian Have
 
PDF
From SIEM to SA: The Path Forward
EMC
 
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
PDF
RSA 2016 Realities of Data Security
Scott Carlson
 
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Interset
 
PDF
Rapid Threat Modeling Techniques
Priyanka Aash
 
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
Changing the Security Monitoring Status Quo
EMC
 
[Webinar] Supercharging Security with Behavioral Analytics
Interset
 
Implementing An Automated Incident Response Architecture
Priyanka Aash
 
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
Creating Order from Chaos: Metrics That Matter
Priyanka Aash
 
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Felipe Prado
 
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
Visualization in the Age of Big Data
Raffael Marty
 
Applied cognitive security complementing the security analyst
Priyanka Aash
 
Accelerating Enhanced Threat Identification and Incident Investigation
Enterprise Management Associates
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Priyanka Aash
 
Next generation security analytics
Christian Have
 
From SIEM to SA: The Path Forward
EMC
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Eric Johansen, CISSP
 
RSA 2016 Realities of Data Security
Scott Carlson
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Interset
 
Rapid Threat Modeling Techniques
Priyanka Aash
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Ad

More from Priyanka Aash (20)

PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
PDF
Keynote : Presentation on SASE Technology
Priyanka Aash
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
PDF
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
PDF
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 

Recently uploaded (20)

PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PPTX
Digital Circuits, important subject in CS
contactparinay1
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PPT
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PDF
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Digital Circuits, important subject in CS
contactparinay1
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
SIZING YOUR AIR CONDITIONER---A PRACTICAL GUIDE.pdf
Muhammad Rizwan Akram
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 

Demystifying Security Analytics: Data, Methods, Use Cases

  • 1. SESSION ID: #RSAC Dr. Anton Chuvakin Demystifying Security Analytics: Data, Methods, Use Cases AIR-T09 @anton_chuvakin Research VP Gartner for Technical Professionals
  • 2. #RSAC Easy, Huh? Security analytics is very easy: 1. Get data. 2. Process with algorithms. 3. Enjoy the insights!
  • 3. #RSAC 1. Defining “SECURITY ANALYTICS” 2. Choosing your road to security analytics success 3. Tooling up for security analytics: myth and reality 4. Best practices for security analytics? Outline
  • 4. #RSAC Detect threat better — and detect "better" threats! Decide what matters, prioritize alerts and signals. Triage alerts faster. Solve (some) security problems with less expert labor. A Little Motivation: Why Security Analytics? Beware of overhyped tools!
  • 5. #RSAC Manual way How many attempts constitute malicious password guessing? 3? 5? 10? 100? Within 1 second? 1 minute? 10 minutes? How to write a rule here? Data-driven / analytics way Run ML on your data, learn from past malicious cases, update models WIN! Example: Password Guessing
  • 7. #RSAC Security analytics = Some advanced analysis of some data to achieve some useful security outcome! Q: What is advanced? A: Anything better than "known good/known bad" rule matching and basic statistics (like "if 10% above average, alert"). Not only machine learning! Q: What data, specifically? A: Really, any data: From logs to flows/sessions, from transactions to various context on users, such as HR data, etc. Definition Drill-Down
  • 9. #RSAC Data/Methods/Use cases: What data is being analyzed? What methods and algorithms are being used? What specific problems are being solved? Analytics Demystifying Framework! Data sources: What data is being analyzed? Methods: What algorithms are being applied? Use cases: What problem is being solved?
  • 10. #RSAC Example: DLP Alert Prioritization Data/Methods/Use cases: What data is being analyzed? - DLP alerts, user identity context, data access logs What methods and algorithms are being used? – PCA to find out which dimensions of the alert matter and how much What specific problems are being solved? – Identifying which alerts indicate significant and dangerous data theft
  • 11. #RSAC Starting Your Security Analytics Journey
  • 12. #RSAC 1. Analytic, data-driven mindset (!) 2. Willingness to explore data 3. Ability to collect and retain data (SIEM helps — isn't a must) 4. Some understanding of data science approaches 5. Availability of people to use the tools, prepare the data and refine the questions Security Analytics Key Success Factors
  • 13. #RSAC Analytic mindset seems to determine the success of analytics and big data initiatives for security more than anything else! Really, A Mindset??! Are you a data explorer or an appliance buyer ("OOBster")? Would you look at your data or at your vendor for answers? Must you have out-of-the-box content (rules, signatures, etc.) for everything? Do you accept that data may have the answers, not the gut feel?
  • 14. #RSAC Products or People: Buy, Build, Partner
  • 15. #RSAC Before You Buy! Does it say BUY THE WRONG PRODUCT anywhere?
  • 16. #RSAC Pros: Solve at least some problems immediately upon installation Solve select problems automatically, without tuning Cons: Risk of limited applicability of the tool beyond specific use cases Rely on vendor to pick and solve problems Buy Choice
  • 17. #RSAC Pros: Leads to development of the capability that can be used to solve future problems Focus resources on organization-specific problem Cons: Extensive effort to build and then mature an analytic capability Skills requirements uncommon for IT organizations (statistics, etc.) Build Choice
  • 18. #RSAC Start with DATA Explore data to find and solve PROBLEMS Grow SKILLS to identify other useful problems and solve them RETAIN KNOWLEDGE and grow analytics capability Start with PROBLEM AT HAND Find the right DATA to solve it Try different ALGORITHMS, tuning the data too LEARN and solve next problem better LOOK at other data and problems How to Avoid “Science Project” Syndrome?
  • 19. #RSAC Pros: Leads to development of the customized capability Leverages vendor/provider expertise gained from previous projects Cons: Longer time to value compared to off-the-shelf products High cost of specialty consulting labor Partner Choice
  • 20. #RSAC However … even if you decide to buy, you may still need to build and definitely tune (both initially and over time!) Warning: Buy Is Often "Buy Then Build"? Buy advantages: Solve at least some problems within 30 days after deployment Solve select problems automatically, without much tuning Supported commercial product may be more comforting to security leaders Rely on vendor expertise with algorithms and statistics; vendor can employ scientists and statisticians
  • 22. #RSAC There is no one "security analytics market." There is no specific "security analytics technology." (and no "big data security analytics technology"). Security analytics is a concept! Several types of very different commercial tools use it. You can also build your own tools — and use OSS heavily: Ever heard of Hadoop? ELK stack? R? Tools: The Mythology Edition
  • 23. #RSAC 1. User behavior analytics (UBA, sometimes UEBA for “entity”) 2. Network traffic analysis (NTA, not a common name yet) … and also: Broad-scope data analysis tools with solid and proven security use cases Tools: The Reality Edition
  • 24. #RSAC But Wait … Where Is SIEM? Source: Gartner (May 2015) Requirement Likely tool type to use Collect log data for compliance, run reports Log management Perform near-real-time security correlation SIEM Detect user anomalies and solve other typical data-intensive problems UBA or other commercial tool Solve organization-specific data intensive problems; collect and analyze diverse data types at high volume Custom-built big data security platform
  • 25. #RSAC UBA or UEBA: What's Inside the Box? Details Example Data Logs (from SIEM or directly), DLP alerts, flows, network metadata, IAM data, HR data, etc. System authentication logs and Active Directory user information. Methods Supervised machine learning, unsupervised learning, statistical modeling, etc. Self-to-self comparison, peer comparison and activity model vs. time. Use cases Compromised account detection, predeparture data theft, employee sabotage, shared account abuse, etc. Detect account takeover by a malicious external attacker.
  • 26. #RSAC Compromised Accounts Found Departing Users Stealing IP Geolocation Anomaly Anomalous Behavior in VPN Activity Customer Service Rep. Privacy Breaches Source Code Compromised Compromised System Behavior Retired Devices Still in Service Unauthorized Access to Patient Records Privileged Accounts Shared Example UBA Tool Wins!
  • 27. #RSAC Network Traffic Analysis: What's Inside the Box? Details Example Data Flows data and network session metadata (to Layer 7), payload data; flows DNS and WHOIS data as context. Application layer traffic data coupled with WHOIS domain registration data. Methods Supervised machine learning, clustering, network modeling, etc. Network activity model over time, traffic volume model by protocol, etc. Use cases Data exfiltration, attacker lateral movement within the network and malware spreading. Detect data exfiltration by the attacker based on traffic volume per protocol per use model.
  • 28. #RSAC 1. SIEM collectors feed SIEM and Hadoop (some direct data collection into Hadoop): One data repository for everything ("data lake") 2. Selective data structuring (Hadoop to MongoDB and PostgreSQL): Tableau fed fromPostgres, custom tools fed from Mongo Also, Solr runs off Hadoop 3. Shared data scientist pool (+ 1 "security data scientist") 4. Visualization and query tools built for junior analysts One Implementation: How They Did It?
  • 30. #RSAC  Given an early stage of these technologies, tool acquisition needs to be targeted at specific problems because there are no "general security analytics tools" on sale. (BUY route)  There is not enough data on the comparative effectiveness of various analytic approaches and algorithms (implemented in vendor tools) versus real-world problems. (BUY route)  Think of the problems first, target purchases at problems, do validate that the vendor of choice has a record of solving such problems. (BUY route)  Think of the data first, and start exploring, then bring tools and components as needed (BUILD route) Recommendations
  • 31. #RSAC  Make the commercial tools EASY TO TEST and PROVE VALUE  Evolve analytics tools to ALGORITHM PORTABILITY  Create CATALOGUE of USE CASES where various analytics tools work well IN REAL WORLD  Add more BRAINPOWER to all security tools! INDUSTRY CALL TO ACTION!