Mark Ryan del Moral Talabis Secure-DNA High-level overview of the - - PowerPoint PPT Presentation

mark ryan del moral talabis secure dna high level
SMART_READER_LITE
LIVE PREVIEW

Mark Ryan del Moral Talabis Secure-DNA High-level overview of the - - PowerPoint PPT Presentation

Alternatives in Analysis Mark Ryan del Moral Talabis Secure-DNA High-level overview of the analysis techniques out there To help you get started with YOUR analysis and research by introducing you to existing tools Tip of the


slide-1
SLIDE 1

Alternatives in Analysis

Mark Ryan del Moral Talabis Secure-DNA

slide-2
SLIDE 2

High-level overview of the analysis

techniques out there

To help you get started with YOUR

analysis and research by introducing you to existing tools

Tip of the iceberg – this will be FAST..

slide-3
SLIDE 3

Security Data Analysis

Security Analytics

GOAL: Look for new and alternative ways to analyze security data

slide-4
SLIDE 4

As security data collection tools continue

to improve and evolve, the quantity of data that we collect increases exponentially

Honeypots and Honeynets Malware Collectors Honeyclients Firewall IDS/IPS System/Network devices

slide-5
SLIDE 5

After the cool tools what remains are tons

and tons of data to sift through!

slide-6
SLIDE 6

Data is often only as valuable as what the

analysis can shape it into.

slide-7
SLIDE 7

Analysis

slide-8
SLIDE 8

Time to build up our arsenal of analysis

Tools Techniques

How? Where?

slide-9
SLIDE 9

Though security in itself is a unique field

with unique needs, analysis techniques

  • ften span the boundaries of different

disciplines

slide-10
SLIDE 10
slide-11
SLIDE 11

Techniques

Data and Text Mining Clustering Machine Learning Baselining Visualization Behavioral Analysis Game Theory

slide-12
SLIDE 12

R-Project Weka Yale (RapidMiner) Tanagra FlowTag Honeysnap Excel and Access Orange

slide-13
SLIDE 13
slide-14
SLIDE 14

Creating a ‘first-cut’ for further analysis New Stuff! Honeysnap

The Honeynet Project Arthur Clune, UK Honeynet Project

slide-15
SLIDE 15
slide-16
SLIDE 16
slide-17
SLIDE 17

Data mining is the process of automatically

searching large volumes of data for patterns

Text mining is the process of deriving high

quality information from text.

Applications:

Forensic Analysis Log analysis IRC analysis

Sample research:

Topical Analysis of IRC hacker chatter through text mining

slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20

Study of human behaviour Perfect for:

Analysis hacker behavior and motivation

Sample research:

Study of hacker motivations through IRC

hacker chatter

slide-21
SLIDE 21

Classification of objects into different

groups, so that the data in each group (ideally) share some common trait

Perfect for:

Classification of Attacks Malware Taxonomy Finding deviations from logs

Sample application:

Classifying Attacks Using K-Means

slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24

Pertains to the collection, analysis,

interpretation or explanation, and presentation of data.

Perfect for:

Executives love stats Baselines

slide-25
SLIDE 25
slide-26
SLIDE 26
  • 0.2
  • 0.1

0.0 0.1 0.2 0.3

  • 0.2
  • 0.1

0.0 0.1 0.2 0.3 PC1 PC2 Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Florida Georgia Hawaii I daho I llinois I ndiana I

  • wa

Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New Y

  • rk

North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode I sland South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington West Virginia Wisconsin Wyoming

  • 5

5

  • 5

5 Murder Assault UrbanPop Rape

slide-27
SLIDE 27
slide-28
SLIDE 28

Applications:

Analyzing and defending against attacks Imitate defenses of the human body

Sample research:

Code Breaking using Genetic Algorithm Genetic Algorithm Approach for Intrusion

Detection

slide-29
SLIDE 29

Economics takes a lot from mathematics,

statistics and other disciplines

Perfect for:

All sorts of stuff

Sample research:

Game Theory and Hacker Behaviour

slide-30
SLIDE 30
slide-31
SLIDE 31

Picture paints a thousand words Perfect for:

Attack detection and analysis

New Stuff! FlowTag

Visual tagging Chris Lee, Georgia Tech

slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34

High level overview of analysis tools and

techiniqes

Made you aware that there are a lot of

things to use out there

To produce good results techniques and

tools could be used together

slide-35
SLIDE 35

A forum where people from different fields

can share data and techniques

Diversity is the Key! Everyone is welcome! Feel free to talk to me more about this

stuff at: ryan@secure-dna.com

slide-36
SLIDE 36

Secure-DNA

slide-37
SLIDE 37

Machine learning is concerned with the

design and development of algorithms and techniques that allow computers to "learn"

Useful for:

Predicting Attacks Self-learning IDS

Sample research:

Predicting attacks using Support Vector

Machines

slide-38
SLIDE 38