Public Security Analytics versus Other Analytics Security Analytics focus on augmenting or automating these functions • Incident Responder • Security Analyst • Security Operations • Threat Hunter • Compliance and Policy • Business Continuity • Cybercrime fighting Outcomes Synthesis/Analytics Telemetry
Public SAMPLED Network Flows ‣Beware: Not Complete! ‣(1) Deterministic: One packet in every n packets or (2) Random: One packet randomly selected in an interval on n packets
Public Telemetry (changes within an observational domain) • AWS Telemetry • Google GCP Telemetry • Azure Telemtry All Telemetry is Data but not all Data is Telemetry • Catalyst • IE • ETA enabled Catalyst Web Security Appliance (WSA) ISR | CSR | ASR | WLC AnyConnect Network Visibility Module ASA | FTD | Meraki Identity Services Engine (ISE) Stealthwatch Flow Sensor Switch Router Router Firewall Server User Cisco Identity Services Engine WAN Server Device Cloud Native Switch Web Router Endpoint Firewall Policy and User Info Other
Public A Chef’s Knife • Behavior 01: Monday night, the chef used it to prepare meals • Behavior 02: Tuesday day, it was used as a murder weapon • Behavior 03: Tuesday night, a passenger was removed from a flight because this object is not allowed on airplanes Behaviors
Public Known Bad Objects & Behavior Known a priori If This Is Good, Then What Is This? Derived from first modeling the good Known Good Outliers & Novelty
Public attributed to Observable 232 Fingerprinting or “Featureprinting” Behavioral Inferences Process Clients Connect to it to print Traffic volumes have a distinct pattern Clients Connect for management Printer {Behavioral Profiles} Behavioral Analytics Connection to AWS! Any activity not yet known!
Public Classification Categorization Behavioral Modeling Behavioral Analytics Observables/Featureprint/Fingerprint Quick Summary of the Analytical Pipeline
Public Encrypted Traffic Analytics Privacy AND Security New Telemetry + Analytics Pipeline so that we infer that we can no longer directly inspect Encrypted Traffic Non-encrypted Traffic
Public Public Disclosure of Research in 2016 Known Malware Traffic Known Benign Traffic Extract Observable Features in the Data Employ Machine Learning techniques to build detectors Known Malware sessions detected in encrypted traffic with high accuracy “Identifying Encrypted Malware Traffic with Contextual Flow Data” AISec ’16 | Blake Anderson, David McGrew (Cisco Fellow) Cisco Research
Public Example: Encrypted Traffic Analytics Detection of Malware without Decryption Cryptographic Compliance Flow Start Time Sequence of Packets Lengths and Times Observables Initial Data Packet Analytics Pipeline of Diverse Methods Outcomes Synthesis /Analytics Telemetry
Public Initial Data Packet • HTTPS header contains several information-rich fields • Server name provides domain information • Crypto information educates us on client and server behavior and application identity • Certificate information is similar to whois information for a domain • And much more can be understood when we combine the information with global data Initial Data Packet IP Header TCP Header TLS Header Ciphersuites TLS version SNI (Server Name) Initial Data Packet(s) Certificate Organization Issuer Issued Expires
Public Sequence of Packet Lengths and Times (SPLT) Client Server Sent Packets Received Packets Exfiltration & Keylogging Google Search Page Download Initiate Command & Control Model Packet lengths, arrival times and durations tend to be inherently different for malware than benign traffic.
Public How Can You Secure a Server When There is No Server? Serverless Security Serverless Computing is a cloud computing execution model in which the cloud provider dynamically manages the allocation of machine resources (ie the servers)
Public What ports/protocols does the device continually access? What connections does it continually make? Does it communicate internally only? What countries does it talk to? How much data does the device normally send/receive? What is the role of the device? Dynamic Entity Modeling Dynamic Entity Modeling Collect Input Draw Conclusions Perform Analysis System Logs Security Events Passive DNS External Intel Config Changes Vulnerability Scans IP Meta Data Dynamic Entity Modeling Group Consistency Rules Forecast Role
Public • All telemetry is data but not all data is telemetry • Focus on the outcome and let that help scope telemetry requirements • Know the difference between signatures and behavioral outcomes • How will users validate your outcomes? • Assume payloads are encrypted – inference is key • Assume a Hybrid Multi-Cloud future Conclusion