Securing Your Network with Anomaly Detection using Distributed Learning Architecture (Learning Networks)

Similar documents
Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)

Self Learning Networks An Overview

Compare Security Analytics Solutions

Introduction. Learning Network License Introduction

The following describes an example Learning Network License deployment and example use cases.

Monitoring and Threat Detection

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Cisco Stealthwatch Learning Network License Virtual Service Installation Guide

Corrigendum 3. Tender Number: 10/ dated

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Encrypted Traffic Analytics

Stealthwatch ülevaade + demo ja kasutusvõimalused. Leo Lähteenmäki

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Cisco Tetration Analytics

Borderless Networks. Tom Schepers, Director Systems Engineering

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018

Flow-based Traffic Visibility

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Network Security Monitoring with Flow Data

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

Battle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019

Improved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis

PSOACI Tetration Overview. Mike Herbert

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Internet Behavioral Analytics (IBA) using Self Learning Networks. JP Vasseur, PhD, Cisco Fellow BRKSEC-3056

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

AMP for Endpoints & Threat Grid

Cisco ASA Next-Generation Firewall Services

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Tetration Hands-on Lab from Deployment to Operations Support

Cisco Advanced Malware Protection against WannaCry

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

Anomaly Detail. Anomaly Detail Overview. The following describes how to review an anomaly's detailed information.

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

The Future of Threat Prevention

Cisco Security Enterprise License Agreement

Features. HDX WAN optimization. QoS

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco dan Hotel Crowne Plaza Beograd, Srbija.

Snort: The World s Most Widely Deployed IPS Technology

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Stealthwatch Learning Network License Virtual Service Quick Start Guide

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

Subscriber Data Correlation

APP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform

SentinelOne Technical Brief

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Hidden Figures: Securing what you cannot see

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Basic Concepts in Intrusion Detection

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

Cisco ISR G2 Management Overview

Threat Centric Network Security

Cisco Tetration Analytics

Cisco Container Platform

Advanced CSR Lab with High Availability and Transit VPC

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks

Cisco Day Hotel Mons Wednesday

Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions

OpenFlow: What s it Good for?

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Security? where to? Adrian Aron. Consultant Systems Engineer. 19 Oct

OSSIM Fast Guide

Cisco Firepower NGIPS Tuning and Best Practices

Introducing Cisco Network Assurance Engine

Anomaly Detection in Communication Networks

Encrypted Traffic Security (ETS) White Paper

Cisco Stealthwatch Endpoint License

Cisco Security Monitoring, Analysis and Response System 4.2

Transforming the Cisco WAN with Network Intelligence

Protect vital DNS assets and identify malware

Enhanced Threat Detection, Investigation, and Response

Intelligent and Secure Network

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Virtual Networking Solution for OpenStack

Features and Functionality

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Intrusion Detection by Combining and Clustering Diverse Monitor Data

SentinelOne Technical Brief

Understanding Cisco Cybersecurity Fundamentals

Stealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x)

Applied Advanced Network Telemetry: ETA and Beyond

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

ProCurve Network Immunity

Implementing and Configuring Cisco SDWAN (ICSDWAN-CT)

Deploying and Administering Cisco s Digital Network Architecture (DNA) and Intelligent WAN (IWAN) (DNADDC)

Course 831 Certified Ethical Hacker v9

Increase Threat Detection & Incident Response

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

Cisco Tetration Analytics

Intelligent WAN : CVU update

Troubleshooting with Network Analysis Module

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

Cisco - ASA Lab Camp v9.0

Novetta Cyber Analytics

NSG100 Nebula Cloud Managed Security Gateway

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Building a Video Optimized Private Cloud Platform on Cisco Infrastructure Rohit Agarwalla, Technical

Transcription:

Securing Your Network with Anomaly Detection using Distributed Learning Architecture (Learning Networks) Alex Honoré, CCIE #19553, Technical Leader, Engineering BRKSEC-3056

Self Learning Networks: A terrific Journey of Innovation BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3

What Self Learning Networks is About... SLN is fundamentally a hyper-distributed analytics platform... Putting together analytics and networking... Goldmine of untouched data on networking gear (sensing) Network learns and computes models on premise (analytics) The Network adapts, modifies its behavior (control) SLN for Security: attacks are incredibly sophisticated and targeted, exfiltration of data being a major concern, requiring a next-generation approach => Stealthwatch Learning Network License True Technology disruption... BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 4

Botnets and Data Ex-Filtration Techniques Size can range from thousands to millions of compromised hosts Botnet can cause DDoS & other malicious traffic (spam,...) to originate from the inside of the corporate network C&C (C2) servers become increasingly evasive Fast Flux Service Networks (FFSN), single or double Flux DGA-based malware (Domain Generation Algorithms) DNS/NTP Tunneling Peer-to-Peer (P2P) protocols Anonymized services (Tor) Steganography, potentially combined with Cryptography Social media updates or email messages Mixed protocols... Timing Channels Internet C&C Server(s) BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

A true paradigm shift (Current) Generation of Security Architectures and Products Specialized security gear connected to the network (FW, IPS,...) Heavily signature-based... to detect known malwares Dynamic update of signatures SLN is Machine Learning-based and pervasive Use of adaptive Machine Learning (AI) technology to detect advanced, evasive Malware: build a model of normal patterns and detect outliers (deviations) High focus on 0-day attacks Use every node in the network as a security engine to detect attacks Complementary to all other technologies (FW, IPS,...) BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

Network as a Sensor in the Branch Learning Network License: Algorithmic Based Anomaly Detector ISR 4K only Stealthwatch: Historical/Statistical Based Anomaly Detector Learning Network License Stealthwatch Behavioral Analytics with Machine Learning Packet Capture at the Branch Level Immediate Local Detection with Machine Learning communication Together Find zero day attacks immediately and find historical trends 30, 60, 90 days in the past Netflow and Behavioral Analytics for Branch Level Security Complete Broad and Deep Branch Level Visibility Behavioral Analytics Based on Rules and Statistical Analysis Packet Capture Integration with Security Packet Analyzer Central Detection with Full Historical Data BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

Joint Use Case: Retail Stealthwatch Management Console Cisco ISE Stealthwatch Learning Manager Retail Store ISR4K with Learning Network License Internet Headquarters MPLS Retail Store ISR4K with Learning Network License Stealthwatch Flow Sensor Netflow and Behavioral Analytics for Branch Level Security Integrated Threat Intelligence with Cisco Identity Services Engine (ISE) Complete Broad and Deep Branch Level Visibility Better Together BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

SLN Architecture

SLN Architecture Principles For Security Fundamentally distributed, building models for visibility and detection at edge Uses Machine Learning (ML) Context enrichment (using ISE integration, Threat Intelligence,... ) Ability to adapt to user feed-back (Reinforcement Learning) Advanced control for fine-grained mitigation BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

Agent Manager SLN Architecture ISE Orchestration of Learning Network Agents Advanced Visualization of anomalies Centralized policy for mitigation Interaction with other security components such as ISE and Threat Intelligence Feeds North bound API to SIEM/Database (e.g. Splunk) using CEF format Evaluation of anomaly relevancy Manager WAN Threat Intel Internet Sensing (knowledge): granular data collection with knowledge extraction from NetFlow but also Deep DLA Packet Inspection on control and data plane & local states Machine Learning: real-time embedded behavioral modeling and anomaly detection Control: autonomous embedded control, advanced networking control (police, shaper, recoloring, redirect,...) Agent 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

An Open Architecture (Manager / SCA) Identity Services Engine Context Enrichment: IP Address (key) Audit session ID User AD Domain MAC address NAS IP & port (!!) Posture TrustSec, SGT,... CEF export (syslog transport) pushing anomalies as events into DB and SIEM SIEM, DB ISE Manager Public/Private Internet Agent Threat Intel Internet TALOS, potentially others FW, IPS/IDS API triggering Mitigation form external Sources such as Firewall, IPS/IDS,... Abstracting networking complexity 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Agent An Open Architecture (Agent / DLA) Manager ISE Threat Intel Threat Grid, OpennDNS, WBRS,... Other TI feeds Northbound API TIP DLC PCM Internet NSC NCC Public/Private Internet Netflow DPI Local Other States Agent BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

SOLT & Traffic Modeling

Before we start... A few (random) facts: Two camps... Super Pro ML and Anti-ML, both have good arguments Extremely wide range of ML algorithms with no one-size-fits-all "No Free Lunch" theorem ML/AI incredibly powerful if applied to solve the right problems Hard to tune? Yes if naively applied... Interpretability, scalability & user experience are essential BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 15

Discussing Recall, Precision, FP,... Few simple notions required when discussing Machine Learning: False Positive (FP), True Positive (TP), False Negative (FN), True Negative (TN), Recall and Precision. Take a Classifier C trained to detect if an event E is relevant (Like) or not (irrelevant). TP: E is classified as relevant and is indeed an relevant FP: E is classified as relevant and is in fact irrelevant (noise) TN: E is classified as irrelevant and is indeed irrelevant FN: E is classified as irrelevant and is in fact an relevant Recall = TP / ( TP + FN) (notion of sensitivity) Precision = TP / (TP + FP) (positive predictive value) Accuracy ACC = (TP + TN) / (TP + TN + FP + FN), Example: if a classifier that is trained to detect dogs in a picture detects 15 dogs, only 10 of them are dogs, and there are 20 dogs in the picture then the Precision = 10/15 = 0.66 and Recall = 10/20 = 0.50 BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Clusters, Self Organizing Learning Topology and Anomalies Key question: how can we model host behaviors? Modeling mixed-behaviors unavoidably leads to hiding anomalies... The fundamental idea of dynamics clustering is to group devices according to behavioral similarity Self Organizing Learning Topologies (SOLT): ability to build Virtual topologies used to learn models between dynamic clusters Clusters become nodes of a graph, traffic becomes the edges Example: find model for HTTP traffic from cluster A to cluster B BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

Dynamic Clustering Internet DLA Cluster: known/internal/network Public/Private Internet Branch 2 Cluster: known/internal/collab Agent Cluster: known/internal/inet::windows Branch 1 BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

Dynamic Clustering Learning of cluster assignment is a dynamic task, and hosts are allowed to transition BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 19

SOLT Clustering Statistics Total # clusters quickly converges towards the 60-75 mark Hosts gradually transition to known state as the system collects more and more samples Behavioral transitions keep occurring as behaviors evolve and/or addresses get reassigned BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 20

Life of an Anomaly Agent Manager Anomaly Clustering: dynamic clustering according to behavioral degree of similarity SOLT NSC NSC : Traffic analysis from multiple data feeds

Hierarchical ML Models Model Germany Boston Scr/Dest Cluster Layer Collab models C1-D1, C1-D2, C1-D3, C2-D1,... NYC File Transfer models C1-D1, C1- D2, C1-D3, C2-D1,... Collab models from C1, from C2, from C3 Collab File Transfer File Transfer models from C1, from C2, from C3 Cluster Layer Voice Printing Application Layer Collab File Transfer BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 22

Inside a Model... Germany Internet High number of dimensions extracted from multi feeds (Netflow, DPI) Public/Private Internet (hundreds of dimensions)... Multi-dimensional and Hierarchical models using stateless/statefull features Rich DNS features: avr names length, # of consecutives vowels, average entropy of characters,... Multi-layer: cluster-clusterapp, cluster-app, app DLA BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 23

Computing SOLT Scores Each scored flow update is evaluated against prior observations, computing the rank of the score over a sliding time window. Flow updates are then marked as anomalous or not based a set of criterion to be met (Maximum rank to be considered as anomalous, Score value, # of samples contributing to model, Maturity of the model (# of samples, time,...). Boosting based on Expert knowledge (application sensitivity, # of features,...) Computes an anomaly score and select TOP anomalies BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 24

Life of an Anomaly Agent Manager Anomaly Clustering: dynamic clustering according to behavioral degree of similarity Modeling SOLT NSC Modeling: dynamically learned baseline with multiple layers, high dimensions space, anomaly detection NSC : Traffic analysis from multiple data feeds

Demo

In this demo, we will show - Smart Dashboard: stats on anomalies,... - SLN System state after learning: cluster,... - DLA states: CPU, memory,... 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Selective Anomaly Forwarder (SAF) & Selective Anomaly Pullers (SAP)

Selective Anomaly Forwarder (SAF) and Selective Anomaly Puller (SAP) Manager 1. When an anomaly is detected by an Agent, its Selective Anomaly Forwarder decides whether this anomaly is worth being sent to the Manager (every Agent is given a "budget" of anomalies it may report) 2. If the SAF decides to forward the anomaly, a digest of the anomaly is sent to the Manager 3. When a digest of an anomaly is received by the Manager, its Selective Anomaly Puller decides whether this anomaly is worth being completely pulled 4. If the SAP decides to pull the anomaly, all the information about this anomaly is requested to the Agent WAN Agent BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 29

Selective Anomaly Forwarder (on the DLA) SAF role is to select the most interesting anomalies to be forwarded to the SCA according to Score of the anomaly, According to a forwarding Budget, with exploration Forwarded Anomalies available budget Considered for exploration Forwarded with probability proportional to importance and available budget BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 30

ANOMALY SHOWN TO USER Selective Anomaly Pullers (on SCA) SAP role is to select the most interesting anomalies from all DLAs to be shown to the user, according to Score of the anomaly for a given DLA and across all DLAs (ensuring good diversity of anomalies), local Budget with exploration Distributed Relevance Learning explained later in great details pull like Inbox Puller (relevance) do not pull Exploration Puller (importance) do not pull DRL prediction pull Discarded Puller (-relevance) ANOMALY IS NOT PULLED dislike do not pull pull BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 31

Life of an Anomaly Agent Anomaly Anomal 9 y 6 A Anomal maly Ano y 4 A n maly n o om 5 aly 1 o m 2 m a al a l y y l 3 y 7 Manager Anomaly Scoring & Ranking Selective Anomaly Forwarder: select the most interesting anomalies according to their score, with exploration Clustering: dynamic clustering according to behavioral degree of similarity Modeling SOLT NSC Modeling: dynamically learned baseline with multiple layers, high dimensions space, anomaly detection NSC : Traffic analysis from multiple data feeds

Demo

2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Killing False Positives with Distributed Relevance Learning

ISE SCA Threat Intel Controller Public/Private Internet DLA 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Traditional Anomaly Detection Systems Focus on Detection (wrong) SCA Core challenge is not Detection itself but Precision (avoid False Threat Intel Positive / Irrelevant alarms) Controller Public/Private Internet ISE DLA 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Traditional Anomaly Detection Systems Focus on Detection (wrong) SCA Core challenge is not Detection itself but Precision (avoid False Threat Intel Positive / Irrelevant alarms) SLN Approach Efficient detection and Precision Controller Public/Private Internet Make the Network learn form its own mistakes DLA and eliminate False Positive! There is a notion of subjectivity too Not a feature but an Architecture ISE 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Distributed Relevance Learning Manager Public/Private Network Reinforcement Learning: Actor Agent training data Statistical Classifier predictions Optimal Forwarder BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 39

Up to 5000 distributed agents analyzing 9 billion networking events Agent Heuristics Optimal Forwarder Pre-trained heuristic selects relevant events.......... Agent Agent WAN Manager Optimal Forwarder ML Model Inbox supervised training Agent 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Relevance can be subjective too! BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 41

Behind the scenes...

Challenges... Design an algorithm with the following properties: 1) Remove False Positive (FP) (anomalies that are not of interest) 2) Do not remove true positive (anomalies that are relevant) 3) Learn quickly (do not require too much feed-back from the user) 4) Be consistent across data set (robustness) 5) Handle inconsistency between users, changing decisions (unlearn) Sophisticated architecture involving several components: 1) Deep Neural Networks (DNN) 2) Classifiers trained with Supervised Learning 3) Active Learning to request labeling of specific elements of a set based on an importance function BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 43

SLN may improperly discard an actual anomaly... (False Negative of the Like Class) => The user can correct mistakes too thanks to the Discarded Box. BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 44

2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

SLN asking for help... (remember exploration?) BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 46

2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Life of an Anomaly Agent Anomaly Anomal 9 y 6 A Anomal maly Ano y 4 A n maly n o om 5 aly 1 o m 2 m a al a l y y l 3 y 7 Manager Selective Anomaly Puller: select the most interesting anomalies according to their score per Agent and across all Agents, with exploration Relevancy Learning Anomaly Selection Anomaly Distributed Relevancy Learning: Likelihood of relevancy (False Positive reduction) DRL Scoring & Ranking Modeling SOLT Selective Anomaly Forwarder: select the most interesting anomalies according to their score, with exploration Modeling: dynamically learned baseline with multiple layers, high dimensions space, anomaly detection Clustering: dynamic clustering according to behavioral degree of similarity NSC NSC : Traffic analysis from multiple data feeds

Packet Capture & Mitigation

PBC Agent DLC PCAP of Anomalous Traffic TIP Northbound API DLC PCM Anomaly Detected: The DLC detects an anomaly in the traffic and gathers all the details to characterize it: time, IP etc. PBC Message: Sends a message to the PBC with the characteristics of the anomaly Circular Buffer NSC Netflow DPI Local Other States Compressed PCAP Files PBC SPAN Traffic Branch Traffic Anomaly Message: Receives the anomaly details from the DLC PBC Search and Extract: Searches for all the packets that match the anomaly characteristics and extracts them to a compressed PCAP file PCAP storage: Maintains list of files per anomaly and purges unused files periodically Push files: Pushes all PCAP files for an anomaly from the Agent when a user requests it Packet Details: File contains packets that have either source or destination IP of the anomaly. Allows to see all activity around the anomaly PCAP Size: Typically ~ 10KB-100KB, 10K-500K packets 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

On-Premise Edge Control Honeypot (Forensic Analysis) Controller infrastructure Manager Control Policy Smart Traffic flagging Traffic segregation & selection Network-centric control (shaping, policing, divert/redirect) Public/Private Internet Agent Agent Agent Shaping BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 51

In this demo, we will show Mitigation triggered by a user from a given anomaly 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

System Requirements

Stealthwatch Learning Network License Requirements Learning Network Manager VMWare ESXi 5.5 Memory 16 Gb 4 Virtual CPUs 1 Virtual NIC 200 Gb of hard disk SCA Manager is Smart Enabled Requires Smart Account on CCO Learning Network Agent ISR 4000 (4451, 4431, and ISR 4351, 4331) ISR 4321 and 4421 support in process for Container, Spring 2017 As a SW Only Agent we require IOS-XE 3.16.0S / 15.4(3)S1 > LXC Container APPX license Application Experience ISR AX, AXV and C1 Bundle includes APPX 8 to 16G memory upgrade (included in all ISR 4K C1 Bundles) Option to add NIM-SSD 200Gb Storage for PCAP Can also be deployed on UCS Blade ISR 28/38 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

ISR 4K w/learning Agent inside IOS XE IOSd Control Plane Learning Agent Linux Service Container Linux OS Netflow and NBAR Data Platform-Specific Data Plane Cisco ISR 4000 Platform Security monitoring now built inside your Cisco NG ISR 4K Router with dedicated core for AD Agent 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

Findings

Quick Status on SLN... Findings? The system does learn, as expected Relevant detected anomalies (time of day, volume, unexpected flows, long live flows,...) SLN detected anomalies it was not explicitly programmed for (Cognitive Computing) Does it detect everything without False Positive? No, such systems simply do not exist but SLN learns and quickly adjusts to customer relevancy learning The Place In the Network (PIN) is fundamental => dramatically extending the protection surface and visibility BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 57

Anomaly: Tor client on corporate network Tor = anonymous/tunneled browsing system based on encryption and multiple hops Host on Beta customer network opened SSL connection to 3 Tor nodes 2 are located in Europe, a 3 rd one has a Japanese hostname but is geolocated in the US BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 58

Anomaly: retail branch subnet scanned for Telnet & SSH Host external to the branch performing a scan of ports TCP/22 & TCP/23 Very subtle scan on a narrow scope and probing only two ports per host BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 59

Anomaly: branch printer making numerous DNS requests over TCP & UDP Abnormally high number of DNS requests for a printer Mix of UDP and TCP for DNS is also unusual BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 60

Anomaly: branch device scanning across the WAN Branch host is scanning addresses located elsewhere on the corporate network Wide port scan, NMAP-style BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 61

Anomaly: new branch host detected at night New host appears on branch network and starts Windows logon sequence Behavior is unusual at this time of day (after 6pm local time) BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 62

Anomaly: SSH session causing a large number of TACACS+ requests Branch network device performs 280 TACACS+ requests in a few seconds Occurs while an SSH session to the device was active Most likely command authorization and/or accounting requests BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 63

Anomaly: branch host transfers 2GB from SSH server running on HTTPS port Branch host downloads 2GB of data from an SSH server on the internet SSH connection terminates on port 443 which is assigned to HTTPS Manual check confirms port misuse, most likely to evade simple L4 firewalls BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 64

Anomaly: branch host performs miniature SYN Flood on server Nearly a thousand incomplete TCP handshakes to a CIFS server within <1 minute; almost like a miniature SYN Flood attempt BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 65

Anomaly: malware Command & Control using DNS as covert channel Active malware Command & Control (C2) channel going to another country Using DNS as covert channel (not fully RFC compliant, but enough to be classified as DNS) Only detected by SLN, although FW and IPS/IDS were active on the network BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 66

Conclusion

Manager ISE Threat Intel Controller Internet Public/Private Internet Agent Agent Agent X 1,000s... BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 68

Manager ISE (Hyper) Distributed Architecture... Scale This *is* the challenge Threat Intel Controller Internet Public/Private Internet Agent Agent Agent X 1,000s... BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 69

Manager ISE (Hyper) Distributed Architecture... Scale This *is* the challenge Threat Intel Controller Internet Public/Private Internet Learning... Adaptive, Ease of Use With dynamic False Positive Reduction Agent Agent Agent X 1,000s... BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 70

Manager ISE (Hyper) Distributed Architecture... Scale This *is* the challenge Threat Intel Controller Internet Public/Private Internet Learning... Adaptive, Ease of Use With dynamic False Positive Reduction Agent Agent Agent X 1,000s Lightweight... Pervasive... BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 71

Product Roadmap (subject to change) FCS 1.0 and 1.1 2.X 3.X Enter market & gain validation Extended capability & context enrichment Expanded footprint HW HW ISR 4431/51, 4351, 4331,and UCS-E Blade HW: add ISR 4321, ISR 4221, ENC 5400 w/isrv, and CSR HW: ASR 1001/1002, investigate NG Switching SW ML driven detection of security anomalies network, Reinforcement Learning Initial mitigation capabilities (API) Central viewing of anomalies on the Learning Manager Dynamic cluster creation PCAP Integration with SMC (new SCA Dashboard in SMC ) Support for Polaris IOS XE 16.4,.5 Reporting with email and POV Reports External anomaly context enrichment : Talos and ETTA Continue SMC Console integration Real-time alerting (email)* Mix of Manual/Automatic cluster definition IPV6 Investigate SLNL (QoS) shaping and ACL capability Q4 FY16 FY17 2H FY17 * SLN DLA (Agent Arch) is specifically targeted for new NG HW from Cisco that support LXC Container, as a Cisco feature differentiator 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

SLNL Part Numbers and Orderability Part Number L-SW-LN-44-1Y-K9 L-SW-LN-44-3Y-K9 L-SW-LN-43-1Y-K9 L-SW-LN-43-3Y-K9 L-SW-LN-UCS-1Y-K9 L-SW-LN-UCS-3Y-K9 L-SW-SCA-K9 L-SW-LN-44-K9= L-SW-LN-43-K9= L-SW-LN-UCS-K9= Product Description Cisco Stealthwatch Learning Network License for Cisco 4400 Series Integrated Services Routers 1 Yr Term Cisco Stealthwatch Learning Network License for Cisco 4400 Series Integrated Services Routers 3 Yr Term Cisco Stealthwatch Learning Network License for Cisco 4300 Series Integrated Services Routers 1 Yr Term Cisco Stealthwatch Learning Network License for Cisco 4300 Series Integrated Services Routers 3 Yr Term Cisco Stealthwatch Learning Network License for Cisco UCS 1 Yr Term Cisco Stealthwatch Learning Network License for Cisco UCS 3 Yr Term Stealthwatch Learning Network Centralized Agent Manager Cisco Stealthwatch Learning Network Software for 4400 Series Cisco Stealthwatch Learning Network Software for 4300 Series Cisco Stealthwatch Learning Network Software for UCS Series The 1Y and 3Y SKU s above indicate the software term. The price for each is on Cisco Global Price List and in Cisco Commerce (CCW). An equal sign (=) in the SKU denotes the software you download and is the master SKU for Ordering https://cisco-apps.cisco.com/cisco/psn/commerce BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 73

Complete Your Online Session Evaluation Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 74

Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Lunch & Learn Meet the Engineer 1:1 meetings LTRSEC-2011 SLN Deployment Lab (instructor-led) Thu 14:00 18:00 (this afternoon!) Hall 2 Level 1, Lab Room 601 BRKSEC-3056 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 75

Thank You