The Threat Hunting Route to Predictive Cyber Security

Similar documents
Building Your Security Operations Center and Taking it to the Next Level

Cyber Risk Mitigation for Smart Cities

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

Demystifying IaaS Adoption for Enterprise Applications

Strengthening Privacy Protection with the European General Data Protection Regulation

Making Software Inclusive and Accessible

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise

Big Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations

Innovation Labs. White Paper. Accelerate Your Digital API Program

Data Governance Simplifying Machine Learning Model Deployment

Data Protection: Your Choice Is Simple PARTNER LOGO

Landscape in the Making

n Explore virtualization concepts n Become familiar with cloud concepts

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy

Gaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance

1 Enterprise Modeler

Leveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes

Device-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Continuity Logic Frontline Live

CA Top Secret r14 for z/os

Multi-drone four-dimensional flight constraint management

Bike MS: 2013 Participant Center guide

Bike MS: 2014 Participant Center guide

Robots in the Back Office: The Future of Recruitment Enterprises

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Data Warehousing. Paper

Service Oriented Enterprise Architecture and Service Oriented Enterprise

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

Web OS Switch Software

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

Addressing SaaS Security

Lecture 28: Data Link Layer

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

Firewall and IDS. TELE3119: Week8

UNIVERSITY OF MORATUWA

SCAN INSPECT TRACK SOLVE

Weston Anniversary Fund

STRATEGIC. alliances & Services

CA InterTest for CICS r8.5

What are Information Systems?

Panel for Adobe Premiere Pro CC Partner Solution

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Guide to Applying Online

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

Intelligent Systems in Retail. Powered by Windows Embedded

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Customer Portal Quick Reference User Guide

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Building the Internet of Everything (IoE) for First Responders

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Τεχνολογία Λογισμικού

Architectural styles for software systems The client-server style

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

Optimizing Out-of-band Management

Python Programming: An Introduction to Computer Science

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Appendix D. Controller Implementation

Threads and Concurrency in Java: Part 1

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

IncorporatingCluster-BasedRelationshipsin Web Rule Language

Threads and Concurrency in Java: Part 1

System and Software Architecture Description (SSAD)

Going Mobile with. SYSPRO Espresso

BE Software Upgrades to ITALYCS 5. It s in the. Software

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

How Deutsche Telekom protects customer data

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

Baan Finance Financial Statements

PayMobile. Features Overview

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

IT administrators face a variety of challenges

A Method of Malicious Application Detection

Evaluation scheme for Tracking in AMI

Baan Tools User Management

TTeconomic ties between the two nations. The bilateral relationship flourished after the accession of H.H. Sheikh

MOTIF XF Extension Owner s Manual

Review: The ACID properties

CAMPUS OF THE SENSES ERLANGEN

ENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:

2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter

TargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1

Modern Systems Analysis and Design Seventh Edition

Goals of the Lecture UML Implementation Diagrams

Designing a learning system

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

THE FUTURE IS EFFICIENT

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

THIRD-QUARTER 2017 REVENUES

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c

Chapter 4 The Datapath

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan

Avid Interplay Bundle

Transcription:

The Threat Hutig Route to Predictive Cyber Security Abstract Withi a icreasigly malicious cyber threat ladscape, our defese mechaisms must mature from beig reactive to proactive ad ally, predictive. For the moder security operatios ceter (SOC), cyber threat hutig is the ext step i the evolutio. With eterprises spedig more tha half a millio US dollars to recover from a breach,1 it's time to ivest i capabilities that ca detect ukow threats before alarms are raised. This will ot oly fortify systems but further improve security cotrols. I this paper, we highlight the differet elemets required for developig cyber threat hutig capabilities ad recommed a structured approach for eterprises across idustries.

Ulike covetioal IT security methods, cyber threat hutig is more proactive ad iterative whe it comes to searchig etworks ad datasets to detect breaches that would otherwise elude existig automated tools. This huma-led methodology leverages aalytics or a machie learig platform ad a combiatio of techiques to couter threats. Oce a ew or possible security risk has bee ideti ed, these are categorized ad added to a automated security iformatio ad evet maagemet (SIEM) platform. The maturity of cyber threat hutig practices depeds o a eterprise's preset state of IT security, ad it's willigess to ivest i techology, people, ad processes to further its capabilities. Buildig Blocks for Threat Hutig The success of threat hutig depeds largely o the data available to the security aalyst team alog with a ivetory of tools ad platforms that ca assist i visualizig, aalyzig, ad applyig isights. This will allow the team to look for ew threats which ca be behavior or tred based. I order to build such a framework, eterprises must take ote of: Data visibility wherei there are comprehesive security /evets that iclude etwork traf c ad applicatio usage iformatio alog with relevat threat itelligece reports Tools such as SIEM, data ad user behavior aalytics, rewalls, ad ed poit solutios Security itelligece which icludes updated exploit iformatio, attack vectors, idicators of compromise (IOC), relevat risk treds, ad situatioal awareess Skills with respect to foresic aalysis, ability to thik like a hacker, ad opeess to cotiuous learig Broadly speakig, the cyber threat hutig process has four key stages: Hypothesis created by a huma aalyst o the basis of treds, recet security evets, threat itelligece reports, ad isights gaied through visualized data Ivestigatio usig tools ad techiques associated with liked data aalysis, visualizatios, statistical aalysis or machie learig

Ucoverig icidet patters ad lateral movemets withi the etwork Performig aalytics to automate the detectio process for similar icidets i the future Cyber threat huters ca leverage Kill Chai, Diamod, or Hopper models which ca aid i idetifyig threats ad itrusio. These models provide ot oly a structured approach for uderstadig the capabilities of cyber crimials but also extract relevat iformatio from the threat itelligece feeds. It's importat to ote that these models o their ow may ot be foolproof. Equifax's recet breach is a great example of how eve the Kill Chai model o its ow proved to be ieffective.2 Most security teams already have too much o their plates ad may at times be usure about what eeds to be prioritized. Perhaps, a more cohesive approach would be to combie these models' stregths. I fact, the Diamod ad Kill Chai aalysis are highly complemetary. Kill Chai allows the security aalyst to target ad egage a adversary ad 'create the desired effects' idetifyig the right set of data alog with high risk idicators. Diamod model applies scieti c priciples to itrusio aalysis ad provides a comprehesive roadmap o how the threat ca be mitigated. Future-Proo g Cyber Security Apparatus As the rst step, eterprises must build a cohesive approach to ehace ad mature their threat hutig capabilities. This must be supported by a proactive threat moitorig methodology leveragig a robust aalytics platform. While this process mostly relies o correlated alerts, through dedicated threat hutig eterprises ca preemptively idetify possible breaches withi the IT eviromet. Newly ideti ed threats ca be categorized ad added to the security maagemet platform (like SIEM) curretly i use. This will help automatically idetify such threats i the future, thereby stregtheig the overall eterprise security posture. This will also help to detect ad address aws i the curret security framework, ad build o existig capabilities rather tha start from scratch each time there's a data breach. Eterprises eed to uderstad their IT ifrastructure hardware, software, ad etwork resources alog with existig security cotrols, people, ad processes before buildig such a approach. As highlighted i Figure 1, the ext steps will iclude:

Network /packet Itroducig ad equippig the data aalytics platform with machie learig ad visualizatio features capable of oboardig huge volumes of out-of-the-box data. Supplyig the platform with the right data sets evets, etwork traf c, ed poit ad applicatio iformatio for visualizig ad aalyzig purposes. Erichig the platform by providig idicators, evidecebased kowledge for trackig advace threats. Visualizig data i terms of assets ad users behavior, alog with etwork treds to idetify exact breach patters ad create hypothetical scearios. Creatig a dedicated ad specialized group of experts to address security issues based o these hypothetical scearios missed by existig SOC teams. Oce suspicious behavior is detected, the threat huter will ivestigate, add threat artifacts to better ucover ad mitigate possibilities of future breaches. Evaluatig the extet of threat peetratio ad data ex ltratio withi a compromised IT eviromet. Itegratig the platform with the automatio egie to automate the detectio process. Data Erichmet Threat Detectio Extet of Threat Dashboard Visualizatio Lateral Movemet Data Aalytic Platform (UBA, ML, AI) Alert Tred Compromised Accouts Data Visualizatio Evet Tred Data Exfiltratio Cotext ad Threat Feeds Idetity Edpoit Server Applicatio Others Figure 1: A ed-to-ed cyber threat hutig approach Automatio

Cosider a example where high DNS traf c triggered a data ex ltratio alert. Usig the Kill Chai model, a eterprise ca work backwards to hut for the root cause. Figure 2 highlights a ideal sceario to detect data ex ltratio. Hypothesis Searched for outboud DNS traffic observed high DNS request cout from oe source Ivestigate From proxy log idetified large amout of data (~1.5MB) beig trasferred Ivestigated with edpoit evets through sysmo observed that process svchost.exe established outboud coectio This is commo whe data is beig exfiltrated Svchost.exe is a commo widows process but the process path is uusual Malware delivered through phishig mail Suspicious as Svchost.exe process establishes public coectio Cotiued with sysmo that shows process path from user space ad ot from system dir. Alog with the paret process ID pdf reader Further search with the file ame shows that it was delivered through phishig mail as a attachmet Ucover Figure 2: Detectig Data Exfiltratio However, we also eed to keep i mid the lessos leart from Equifax's massive data breach. Most Iteret applicatios (at risk from exteral attackers) are usually placed i a demilitarized zoe (DMZ). Commuicatios betwee these apps ad the eterprise's iteral systems are more predictable, wherei security teams ca ote the frequecy of access, credetials used, volume, ad so o to build a adaptive behavioral pro le. Malicious activities that usually go uoticed ca be tracked usig user ad etity behavioral aalytics (UEBA). Moreover, eterprises must use cotaiers for applicatios, which provide more protectio tha physical servers ad virtual machies. Usig a Docker le, these cotaiers create applicatio images, which ca be scaed easily before deploymet to discover kow vulerabilities. A vulerable applicatio ca the be swapped out seamlessly oce a update patch is available. But these aloe will ot be able to prevet attackers from exploitig the Kill Chai. Herei, a breach ad attack simulatio platform ca help security teams gai a thorough uderstadig of these threat

actors. Across the Kill Chai, aalysts ca ote the differet ways a attacker ca i ltrate, move laterally to a deeper part of the etwork, ad ex ltrate data buyig time for security teams to gure out the best way to break the Kill Chai. Oe ca start with segmetatio to stop the lateral movemet, or simply focus o stoppig data ex ltratio with data leakage prevetio (DLP) solutios. A set of deep packet ispectio (DPI)-eabled patter match sigatures ca prevet attacks similar to Equifax's. Geerally, the attack vectors utilize predictable parameters. Geerally, malicious HTTP requests have a shell commad embedded i a XML object or a malformed header. Security teams ca develop sigatures based o these attack patters, while DPI ca help limit false alarms. Fortifyig the Way Forward It's time for eterprises to adopt a cotiuous process of proactively evaluatig threats that may i ltrate their etworks ad systems, rather tha ivestigate whe the eed arises. This will require establishig dedicated teams ad implemetig platforms to ucover ukow threats, ad ot be limited to prede ed alerts usually co gured i SIEM. As the eterprise security posture matures, it will be easier to de e ad follow a foolproof threat hutig roadmap leveragig arti cial itelligece (AI) ad machie learig to detect breaches ad automate the remediatio process. Refereces 1. Kaspersky lab, Damage Cotrol: The Cost of Security Breaches IT Security Risks Special Report Series, accessed o Jauary 10, 2018, https://media.kaspersky.com/pdf/it-risks-survey-reportcost-of-security-breaches.pdf 2. Federal Trade Commissio, Cosumer Iformatio, The Equifax Data Breach: What to Do, September 8, 2017, accessed o Jauary 30, 2018, https://www.cosumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do

About The Author Prikshit Goel Prikshit Goel heads the Maaged Security Services as part of TCS' Cyber Security Practice. He focuses o providig security ad IT ifrastructure solutios to the customers by leveragig relatioships with strategic parters ad developig ew offerigs i the security space. He is also resposible for developig traiig framework, accelerators ad a effective competecy pla for both solutio desig ad delivery. He has over 17 years of experiece i the IT space with a focus o Iformatio Security ad Networks. He also holds may idustry certificatios such as PMP, Cisco CCNP ad CCNA, ITIL, BAC, CEH, Spluk, Avaya, ITIL, Six Sigma Gree Belt ad ACS ad is traied i security products such as RSA, Symatec, Palo Alto, ad Cisco across various layers. Cotact Visit Cyber Security page o www.tcs.com Email: cyber.security@tcs.com Subscribe to TCS White Papers TCS.com RSS: http://www.tcs.com/rss_feeds/pages/feed.aspx?f=w Feedburer: http://feeds2.feedburer.com/tcswhitepapers Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled, ifrastructure, egieerig ad assurace services. This is delivered through its uique Global Network Delivery ModelTM, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. For more iformatio, visit us at www.tcs.com All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2018 Tata Cosultacy Services Limited TCS Desig Services I M I 02 I 18 About Tata Cosultacy Services Ltd (TCS)