32
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. INTERNAL USE ONLY 2016 FEDERAL FORUM Presented by Produced by Security

Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. INTERNAL USE ONLY

2016 FEDERAL FORUM

Presented by Produced by

Security

Page 2: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Computing & Computers

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Computers have evolved tremendously

2

Page 3: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

National Academy of EngineeringGrand Challenges for 21st Century

• Make solar energy economical

• Provide energy from fusion

• Develop carbon sequestration methods

• Manage the nitrogen cycle

• Provide access to clean water

• Restore/improve urban infrastructure

• Advance health informatics

• Engineer better medicines

• Reverse-engineer the brain

• Prevent nuclear terror

• Secure cyberspace

• Enhance virtual reality

• Advance personalized learning

• Engineer tools of scientific discovery

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 3

Page 4: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

25%

25%

50%Not sure where their organization fits in regards to having the appropriate security measures in place

Believe that the appropriate security measures are in place to support their agencies’ needs

Do not believe that the appropriate security measures are in place to provide the appropriate level of protection

SOURCE: MARKET CONNECTIONS - IS DATA AS SAFE AS AGENCIES THINK IT IS? © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4

Page 5: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Believe that moving forward 256 bit encryption is a requirement for protecting sensitive, secret and top secret data sets

Associate SSL as their primary encryption measure within their particular agency

Have NO idea what security measures are in place to protect any form of agency-specific data

SOURCE: MARKET CONNECTIONS - IS DATA AS SAFE AS AGENCIES THINK IT IS?

62%

9%

32%

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 5

Page 6: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 6SOURCE: MARKET CONNECTIONS, INC.

Page 7: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Agency Cyber Priorities & Budgets Agencies’ cybersecurity priorities for 2015 include a widespread focus on prevention (72%), and budgets reflect this

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 7SOURCE: MARKET CONNECTIONS, INC.

What are your agency’s cybersecurity priorities for 2015 with regard to prevention?

To the best of your knowledge, in each of the following areas did your agency’s cybersecurity budget increase, decrease, or stay about the same as the previous fiscal year?

4%

24%

72%

0

20

40

60

80

100

High Priority

Moderate Priority

Not a Priority

24%

76%

8%

6%

71%

24%

0

20

40

60

80

100

Increase in FY 2015

About the same inFY 2015 as previousfiscal year

Decrease in FY 2015

2015 Cybersecurity Prevention Budget

2015 Cybersecurity Prevention Priority Level

96% 95%

Page 8: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

General Threat Landscape

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 8

>3,000,000,000,000 threats annually

50% 25%25%

Legacy Threatsblocked

Advanced Threatsdetected undetected

1.6Bnumber of records lost

globally in 2014

$236Mrecovery cost of Target

breach (so far)

$110Bannual price tagof cybercrime

(Avg. $27.3 loss per incident)

15Bconnected devices

in 2015

Page 9: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Current State

• More connected devices more value added risk

• Security posture hasn’t magically just improved

– In many cases in fact it has regressed

• Heterogeneous security paradigms

– Device-end data is processed out of band

– Dubious infrastructure security posture

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 9

Page 10: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Complexity Is Increasing

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10

• Space Shuttle: ~400K LOC

• F22 Raptor fighter: ~2M LOC

• Linux kernel 2.2: ~2.5M LOC

• Hubble telescope: ~3M LOC

• Android core: ~12M LOC

• Future Combat System: ~63M LOC

• Connected car: ~100M LOC

• Autonomous (?) vehicle: ~300M LOC

Page 11: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

• Autonomous vehicle: ~300M LOC

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 11

• Large Hadron Collider: 60M LOC

• Facebook: 50M LOC

Page 12: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

E.g., Connected Vehicle

• Hackable?

• Concept hacks

• Drivetrain exploits

• Notice the speed and gear position?

• Infrastructure VPN to backend 1-N exploits

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 14

Page 13: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Currently, Security Is Static

• Our systems are actively passive

• Need to know all the attack cases ahead of time

– Presumptuous design

• Best case: Don’t be the worst to fail!

• Static security used to be enough: no longer the case

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 16

Page 14: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

So, What Are We Doing About It?

Page 15: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Many Types of Security Companies

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 19CTO ROUNDTABLE, 03/25/2016

Denial of Service Mitigation

Realtime Fraud Detection

End Point Security / Malware Inoculation

Application Security

Identity & Access Management

Security Analytics / Threat Intelligence

Insider Threat Prevention / DLP

Cloud Security

Security Orchestration & Workflow Management

Network Security Monitoring

Security

Page 16: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Platform to Enable Security Innovation

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 20

Network Security Solutions Today

Brocade Open Platform for Network Security Innovation

Lead the core network-based security capabilities

Security

Page 17: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Network as a Platform for Innovation

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 21OFFICE OF THE CTO

MachineLearning

NetworkVirtualization

Software Defined

Networking

Security

Mobility

Automation

Cloud Services

DevOps

Big DataAnalytics

Network as a Platform

for Innovation

Page 18: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Brocade Technology Stack

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 22

Network Virtualization• EVPN

• VTEP

• Service Chaining

High-Performance HW Infrastructure• DC SAN

• DC Ethernet and IP Fabrics

• DC Routing

• Campus Switching

• Wireless & Small Cell

SDN Applications / Automation• Brocade SDN Controller, Orchestrator

• Network, Security, Analytics, Mobility Apps

• DevOps

Virtualized Network Services • vRouter, vNAT, vADC, vFW, vCPE, vEPC…

• Vyatta Network OSGrowth

Core

Virtual Services Platform

Brocade App Platform/SDN Controller

Open Interfaces

vFW

vSLB

vNA

T

vVP

N

vIPS

vBN

G

vTA

P

vSB

C

vEP

C

Analytics SecurityMachine Learning

MobileEmerging

Page 19: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Machine Learning: A Foundational Technology at Brocade

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 23

• Breakthrough representations for network data

• Innovative deep neural network architectures

• New applications of reinforcement learning

• Solid mathematical foundations

Theory

• Integration of Brocade ML with the Brocade Data Fabric, Brocade SDN Controller, and the Brocade Open Platform for Network Security Innovation creates a new kind of predictive, actionable, and real-time intelligence

• Uniform support across all Brocade product lines

• Complete OODA loop

Implementation

Algorithms

• Open Source, data and models where possible

• Provide/receive data/intelligence to/from partners

• Integration with DISA CMRS mission partners

• Industry and academic partnerships

Ecosystem

• Knowledge-Defined Networking

• Deep neural networks predict/ recognize APT activity

• Optimal (risk aware) control discipline

• Conventional statistical techniques where appropriate

• Dynamic/on-line vs. static

ML @ BRCD

Page 20: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Brocade Data Fabric and ADP2*

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 24*ADP2: ANOMALY DETECTION, PREVENTION AND PREDICTION

Endpoint Network SAN Apps Control 3rd PartyMgmt

Network Event Secure Publish-Subscribe

Network Infrastructure

SIEM and Analytics Big Data Engine (Ecosystem)

Spark Core Cluster

Data Warehouse

Data Collectors and Sinks

High Value SDN Applications

Dashboard Anomaly Detection

Data Breach Prevention

Flow Optimizer

Insider Threat

Cyber Maneuver

BrocadeMachine Learning

Plug-ins

Brocade A&I/SDNController

BrocadeData

Fabric

Brocadeand 3rd Party

ML ML ML ML ML ML ML

Page 21: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Two Types of Security

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 25

Static Security

• Designed for known attacks

• Tailored to specificabuse cases

• Need to know adversary profiles ahead of time

• Manual patching and update

• Inflexible un-scalable

• Best case: just “detect”

• Yet absolutely necessary

Dynamic Security

• Data- and analytics-driven

• Adjusts based on runtime security posture of the system

• Adaptive, active, and learning

• Self-organizing, automated

• Proactive, self-defending

• Predicts attacks

• Improves with scale

Real action is in Dynamic Security

Machines and humans are becoming more similar

Page 22: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Static Security Building Blocks

• Assets, attack tree, VATA

• Identity, authentication, authorization

• Cryptography (confidentiality, integrity, authenticity, non-repudiation)

• Attestation, verification, run-/load-/crash-time integrity validation and measurement

• …

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 26

Static Security

Page 23: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Dynamic Security Building Blocks

• AI

• AI + Big Data + Analytics

• AI + Big Data + Analytics + ML/DL

• Data Information Actionable Intelligence (AI?)

– Action is the next big thing

– Professor Karl Friston, University College London

– “Order of Magnitude Labs”, etc.

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 27

Dynamic Security

Page 24: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Dynamic Security & Data

• Dynamic Security in theory improves with scale

• IOT = more data

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 28SLIDE COURTESY OF ADAM COATES, BAIDU RESEARCH

Past Present Future

Page 25: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Challenges

• Baselining

– Curse of dimensionality

• We have Operating Systems

– We need Cooperating Systems

– Among mutually-distrusting actors

• Privacy

– Data sharing: digital equivalent of cognitive dissonance

– DataHub @MIT CSAIL: very promising project

• Sandy Pentland, Thomas Hardjono, et al.

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 29

Page 26: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Challenges (Cont.)

• Simple correlations

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 30

Page 27: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Challenges (Cont.)

• Simple correlations

• Statistical significance

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 31

Page 28: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Challenges (Cont.)

• Simple correlations

• Statistical significance

• Combinatorial explosion of state-space

– AKA Curse of Dimensionality

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 32

Page 29: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Challenges (Cont.)

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 33

If you torture data long enough, it will confess to anything you’d like.

R.H. Coase, British Economist

Page 30: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Generic Use Cases

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 34

Social Media

Security, Defense, and Intelligence

Consumer Electronics

Medical Energy Media & Entertainment

Page 31: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

Cyber Analytics Use Cases

• Scalable training of large datasets (logs, traffic, etc.)

• Real-time network anomaly detection

– Deep packets, edge logs, etc.

– DDoS, malware

• Botnet detection

– Zombie hosts, command and control, targets

• Host malware detection

• Internal fraud detection

• …and applying predictive modeling to all the above

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 35

Page 32: Security - Government Executive · •Innovative deep neural network architectures •New applications of reinforcement learning •Solid mathematical foundations Theory •Integration

© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Thank you