19
AN ECOSYSTEM FOR SECURITY YIANNIS GIOKAS FOUNDER & CEO TOWARDS ADVANCED THREAT DETECTION CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

TOWARDS ADVANCED THREAT DETECTION AN ... - 7o Infocom Security · trends security as a service – changes the way we monitor systems complexity delegation security ecosystem •

  • Upload
    lamdat

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

AN ECOSYSTEM FOR SECURITY

YIANNIS GIOKAS

FOUNDER & CEO

TOWARDS ADVANCED THREAT DETECTION

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

AGENDA

• MARKET ALIGNMENT

• SECURITY TRENDS AND FACTS

• BUILDING A SECURITY ECOSYSTEM

• Q & A

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

TRENDS &

FACTS

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

TRENDS SECURITY AS A SERVICE – CHANGES THE WAY WE MONITOR SYSTEMS

COMPLEXITY DELEGATION

SECURITY ECOSYSTEM

• COST EFFECTIVE

• RISK BOUNDED

• BUSINESS EFFICIENT

• COMBINED SYSTEMS

• SEVERAL DATABASES

• INTELLIGENT PROCESSES

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

FACTS SECURITY AS A SERVICE – MUST BE REAL-TIME AND INTELLIGENT

• HIGHLY VALUEABLE

• FULLY AUTOMATED

• PROFILE BASED

• MACHINE LEARNING

• INTELLIGENT ACTIONS

• DYNAMIC PATTERNS

REAL-TIME ALERTING

NON-DETERMINISTIC APPROACH

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

MARKET ALIGNMENT

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

WHAT OTHERS DO TRANSITION FROM TRADITIONAL SIEM TO CLOUD ECOSYSTEMS

SPLUNK

QRADAR ARCHSIGHT LOGRYTHM

MCAFEE LOGGLY

NEXDEFENSE SCALYR ALERTLOGIC

THETARAY

• MOVING AWAY FROM SIEM

• MAINLY INTRUSIVE SERVICES

• OFFER SECURITY AS A SERVICE

• REAL-TIME BECOMES A GOAL

• DATA VISUALIZATION

• CHARGE PER SERVICE

• DATA ANALYSIS

• INVESTING INTO MACHINE LEARNING

• ADOPTING INTO THE CLOUD

SUMO LOGIC

LOGLOGIC

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

BUILDING A SECURITY ECOSYSTEM

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

OUR TEAM BUILDING OUR OWN SECURITY ECOSYSTEM

THREATIQ

THREATDB

MOREAL

3 DIFFERENT SYSTEMS CO-OPERATING

• PROFILE

• REPORT

• VISUALIZE

• ANALYZE

• DECIDED

• ALERT

• COLLECT

• PROCESS

• INDICATE

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

MOREAL “ A COMPLETE INTERFACE FOR VISUALIZING AND REPORTING THREATS”

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

THREATIQ “ THE INTELLIGENT COMPONENT FOR REAL-TIME THREAT DETETION”

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

THREATDB “ THE LIGHTWEIGHT COMPONENT FOR THREAT AGGREGATION ”

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

HOW IT WORKS 1. COLLECTS THREATS FROM 23 DIFFERENT SOURCES

2. AGGREGATES DIFFERENT DATA TYPES

3. CREATES THREAT INDICATORS

4. UPDATES REAL-TIME DATABASE

5. KEEPS A HISTORICAL DATABASE

6. EVALUATES TRENDS VIA STATISTICS

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

SAMPLE SOURCES https://cve.mitre.org/data/downloads/allitems.csv.gz

http://www.unsubscore.com/blacklist.txt

http://support.clean-mx.de/clean-mx/xmlviruses.php?

http://www.malware-domains.com/files/Zeus-Gameover.zip

http://rss.uribl.com/reports/14d/dns_a.xml

http://www.shallalist.de/Downloads/shallalist.tar.gz

...

more

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

INDICATORS THREAT RECORD INDICATORS

Real-Time Database

KEY VALUE

139.23.1.123 11.32%

1verygoods.ru 56.34%

http://hsbc-premier.ma.cx 89.13%

[email protected] 78.34%

CVE-1999-1006 91.11%

http://s3.amazonaws.com/tr.exe 99.90%

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

INDICATORS

0

500000

1000000

1500000

2000000

2500000

3000000

3500000

4000000

4500000

1-Μαρ 2-Μαρ 3-Μαρ 4-Μαρ 5-Μαρ 6-Μαρ

CREATING THREAT RECORD INDICATORS (TRIs) Historical Database

THREATS

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

ADVANCEMENTS 1. PERFORM DEEP CRAWLING

2. PROCESS MORE COMPLEX DATA

3. INTRODUCE PATTERN BASED THREATS

5. PROVIDE FEED SUBSCRIPTION TO 3RD PARTIES

4. DIRECT ACCESS VIA A WEB INTERFACE

6. VISUALIZE STATISTICS FOR SOC TEAMS

7. PUBLIC APIS FOR EXTERNAL PARTNERS

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

THE INTERNALS 1. A STAND-ALONE MODULE

2. USES REDIS AND MONGODB

3. INTENTION TO PROVIDE EXTERNAL APIS

4. SUPPORTS DIFFERENT FORMATS (CVE, XML)

5. LOWER LEVEL MODELING (C/C++)

6. AN UPDATE COMPLETES IN LESS THAN 10 MINUTES

7. ROUGHLY, 3,000,000 THREATS PER DAY

8. BLACKLISTED: IP, EMAILS, DOMAIN, URLS, CVES

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL

THANK YOU ANY QUESTIONS?

CRYPTEIA NETWORKS © 2015 - CONFIDENTIAL