Slide 1

Slide 1 text

Elastic Date: 01/March/2018 A Security Analytics Platform for Today Kevin Keeney, Cybersecurity Advocate, Samir Bennacer, Senior Solutions Architect

Slide 2

Slide 2 text

2 Attacks are inevitable

Slide 3

Slide 3 text

Data Collection For effective security analysis

Slide 4

Slide 4 text

• Collect all parts of the puzzle • Normalize for aggregation and correlation across sources • Enrich to extend attributes available for analysis • Index for immediate recall Foundation for Effective Security Analysis Collect Normalize Enrich Index

Slide 5

Slide 5 text

Data Sources Domain Data Sources Timing Tools Network PCAP, Bro, NetFlow Real time, Packet-based Packetbeats, Logstash ( netflow module) Collect Normalize Enrich Index

Slide 6

Slide 6 text

Data Sources Domain Data Sources Timing Tools Network PCAP, Bro, NetFlow Real time, Packet-based Packetbeats, Logstash ( netflow module) Application Logs Real-time, Event-based Filebeats, Logstash Collect Normalize Enrich Index

Slide 7

Slide 7 text

Data Sources Domain Data Sources Timing Tools Network PCAP, Bro, NetFlow Real time, Packet-based Packetbeats, Logstash ( netflow module) Application Logs Real-time, Event-based Filebeats, Logstash Cloud Logs, API Real-time, Event-based Beats, Logstash Collect Normalize Enrich Index

Slide 8

Slide 8 text

Data Sources Domain Data Sources Timing Tools Network PCAP, Bro, NetFlow Real time, Packet-based Packetbeats, Logstash ( netflow module) Application Logs Real-time, Event-based Filebeats, Logstash Cloud Logs, API Real-time, Event-based Beats, Logstash Host System State, Signature Alert Real-time, Asynchronous Auditbeats, Filebeats ( Osquery module),Winlogbeats Collect Normalize Enrich Index

Slide 9

Slide 9 text

Data Sources Domain Data Sources Timing Tools Network PCAP, Bro, NetFlow Real time, Packet-based Packetbeats, Logstash ( netflow module) Application Logs Real-time, Event-based Filebeats, Logstash Cloud Logs, API Real-time, Event-based Beats, Logstash Host System State, Signature Alert Real-time, Asynchronous Auditbeats, Filebeats ( Osquery module),Winlogbeats Active Scanning User-driven, Asynchronous Vulnerability scanners Collect Normalize Enrich Index

Slide 10

Slide 10 text

Event Agent Device Network Source Destination Service Threat GeoIp User Network Protocols… Various Services… Group 1 (Must be populated) Group 2 (Must be populated to the max extent practical where event message contains relevant fields.) Host Group 3 (should include Group 2 prefix and may include Group 3 prefix(es) in field names. Any Group 3 prefixes must not conflict with any defined ECS field name.) @timestamp ecs_version message File Error Elastic Common Schema Collect Normalize Enrich Index

Slide 11

Slide 11 text

Logstash Inputs Beats … … JDBC … … TCP UDP HTTP Filters Extract Fields Geo Enrich Lookup Enrich DNS Lookups Pattern Matching ArcSight Codec … Network / Security Data Syslog Servers Infra / App Data IoT / Sensors Persistent Disk Based Queues Normalization and Enrichment Beats Outputs Elasticsearch … … … … … Kafka RabbitMQ RDBMS Centralized Configuration Management Elasticsearch Collect Normalize Enrich Index

Slide 12

Slide 12 text

Threat intelligence Geo IP Information Other Information • Reputation information • IOCs • Vulnerability Data • TTPs • Physical Location • Country, State … • Postal Code • Geo Fence • Network Model • User information • Org Chart • DNS resolution Data Enrichment Collect Normalize Enrich Index

Slide 13

Slide 13 text

A common use case is looking up ips from a spam/bot feed: filter {
 memcached {
 hosts => ["127.0.0.1:11211"]
 get => {
 "%{ip}" => "threat_src"
 }
 }
 } Recommend to read the blog https://www.elastic.co/blog/elasticsearch-data-enrichment-with-logstash-a-few-security-examples Example: Botip Lookup

Slide 14

Slide 14 text

Alert Based detection Event Correlation

Slide 15

Slide 15 text

●Event correlation ●Cross-source Correlation ●Tiered Correlation ●Chained Correlation Alert Based detection

Slide 16

Slide 16 text

Event correlation Logstash Elasticsearch X-pack X-pack Alerting Zoom

Slide 17

Slide 17 text

Detecting Anomalies using ML

Slide 18

Slide 18 text

What is Normal? When something behaves like itself Monday Tuesday Wednesday Thursday When something behaves like its peers

Slide 19

Slide 19 text

high memory alerts -- server 1 -- server 2 -- server 3 Host Behavior • Free disk space lower than average • Unusual log entries Network Behavior • Unusual connections between hosts • Higher than average data transfer Application Behavior • Service response time abnormally high • Dropped connections exceed normal When abnormal matters

Slide 20

Slide 20 text

20 Understand Seasonality Reduce False Positives Avoid Manual Review and Revision The advantages of anomaly-driven alerting Identify Areas of Focus

Slide 21

Slide 21 text

Getting Started – Machine Learning Recipes

Slide 22

Slide 22 text

Threat Hunting

Slide 23

Slide 23 text

Humans are more important than Hardware.

Slide 24

Slide 24 text

Cyber is a human versus human conflict -dcode

Slide 25

Slide 25 text

Know Thy Enemy Strategic Who & Why Tactical How & What

Slide 26

Slide 26 text

Know Thy Self BlindSpots Culture Most Valuable Data Critical Systems

Slide 27

Slide 27 text

Intelligence Operations

Slide 28

Slide 28 text

What are you looking for? Hypothesis Investigation New Patterns and IOA IOCs Inform and Enrich Different data sets Identify the patterns Feed the IOCs back create new alerts to improve the speed of the detection Operations Intelligence Intelligence

Slide 29

Slide 29 text

29 Pulling it all together… Understand who is your Adversary? 
 What is their Motivation ? What is the Impacts Of a successful attack? What are they targeting?

Slide 30

Slide 30 text

Speed is king

Slide 31

Slide 31 text

People are our most precious resource

Slide 32

Slide 32 text

www.elastic.co

Slide 33

Slide 33 text

Except where otherwise noted, this work is licensed under http://creativecommons.org/licenses/by-nd/4.0/ Creative Commons and the double C in a circle are registered trademarks of Creative Commons in the United States and other countries. Third party marks and brands are the property of their respective holders. 33 Please attribute Elastic with a link to elastic.co