SlideShare a Scribd company logo
1 of 35
GabrielDusil
VP, GlobalSales& Marketing
www.facebook.com/gdusil
cz.linkedin.com/in/gabrieldusil
gdusil.wordpress.com
dusilg@gmail.com
Experts in Network Behavior Analysis
Page 2, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Download the native PowerPoint slides here:
 http://gdusil.wordpress.com/2012/04/15/anatomy-of-advanced-persistent-
threats/
Or, check out other articles on my blog:
 http://gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 3, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Old threats were IT Oriented
 Fame & Politics
 Boredom & Personal Challenge
New threats focus on ROI
 Fraud & Theft
Criminals now take a strategic
approach to cybercrime
 Companies now compensate by
building higher walls
Battles may have been
won & lost on both sides…
…But the war is far from over.
Experts in Network Behavior Analysis
Page 4, www.cognitive-security.com
© 2012, gdusil.wordpress.com
4
People + Process + Technology = Business Challenges
Experts in Network Behavior Analysis
Page 5, www.cognitive-security.com
© 2012, gdusil.wordpress.com
• A bug, glitch, hole, or flaw in
a network, application or
database
• Attack developed to take
advantage of a vulnerability
• Attack on a selection of
vulnerabilities to control a
network, device, or asset
• Software designed to fix a
vulnerability and otherwise
plug security holes
• Attack against an unknown
vulnerability, with no known
security fix
 Methodical, long-
term covert attacks, using
many tools to steal info
Experts in Network Behavior Analysis
Page 6, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Blended
Threats
• Include embedded URLs that link toan infected Webpage
• Employsocial engineering to encourage click-through.
Infected
Websites
• Victim visits legitimate site infected by malware (eg. CrossSite
Scripting, oriFramecompromise)
Malware
Tools
• Back-door downloaders, keyloggers, scanners & PWstealers
• Polymorphic design toescapeAV detection
Infected
PC(bots)
• Onceinside the, infiltrating orcompromisingdata is easy
• SomeDDoS attackscan originate frominternal workstations
Command&
Control(C2)
• Remoteservers operated by attackercontrol victim PCs
• Activity occursoutside ofthenormalhours, to evade detection
Management
Console
• Interface used tocontrol all aspects of theAPTprocess
• Enables attackerstoinstall new malware &measuresuccess
Experts in Network Behavior Analysis
Page 7, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Advanced
Persistent
Threats
Heavy DNS
Use &
Sophisticated
Scans Periodic
Polling
- Command
& Control
Unexpected
new service
or Outlier
ClientOutbound
Encrypted
sessions
(eg. SSH)
Peer 2 Peer
Network
Behavior
Unclassified
Behavior -
Unexpected
Anomaly
Experts in Network Behavior Analysis
Page 8, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Web Browsers
 IE, Firefox, Opera,
Safari, Plugins
Applications
 Adobe Flash,
Codecs,
QuickTime
Rich Complex
Environments
 Java, Flash,
Silverlight,
.NET & J2EE % of
Security
Attacks
% of
Security
Spending
8.Web
7.App • HTTP,SMTP, FTP
Presentation • SSL,TLS
5.Session • TCP,SIP
4.Transport • TCP,UDP
3.Network • IP
2.Data • 802.11,FDDI,ATM
1.Physical • 1000Base-T, E1
80%
Apps
10%App
90%
Network
20%
Network
Experts in Network Behavior Analysis
Page 9, www.cognitive-security.com
© 2012, gdusil.wordpress.comIBM - X-Force (Mid-year Trend & Risk Report '11
Experts in Network Behavior Analysis
Page 10, www.cognitive-security.com
© 2012, gdusil.wordpress.comIBM - X-Force (Mid-year Trend & Risk Report '11
Experts in Network Behavior Analysis
Page 11, www.cognitive-security.com
© 2012, gdusil.wordpress.com
“The Zeus Trojan…,
….will continue to receive
significant investment
from cybercriminals
in 2011.”
“The aptly named
Zeus,… …targeting
everything from bank
accounts to government
networks, has become
extremely sophisticated
and is much more.”
Cisco - Annual Security Report '11
Experts in Network Behavior Analysis
Page 12, www.cognitive-security.com
© 2012, gdusil.wordpress.com
“Going into 2012,
security experts
are watching
vulnerabilities in
industrial control
systems &
supervisory
control & data
acquisition
systems, also
known as
ICS/SCADA.”
Cisco - Annual Security Report '11
Experts in Network Behavior Analysis
Page 13, www.cognitive-security.com
© 2012, gdusil.wordpress.comCisco - Annual Security Report '11
Experts in Network Behavior Analysis
Page 14, www.cognitive-security.com
© 2012, gdusil.wordpress.com
 “[Hacking] Breaches… …can be because
they may contain sensitive data on clients as well as employees that even an
average attacker can sell on the underground economy.”
Source: OSF DataLoss DB,
Symantec – Internet Security Threat Report ‘11.Apr
Experts in Network Behavior Analysis
Page 15, www.cognitive-security.com
© 2012, gdusil.wordpress.com*Verizon – ‘11 Data Breach Investigations Report
Experts in Network Behavior Analysis
Page 16, www.cognitive-security.com
© 2012, gdusil.wordpress.com
% breaches / % records
footprinting and fingerprinting) - automated scans for open ports &
services
Experts in Network Behavior Analysis
Page 17, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Primarily targets are bank accounts
McAfee Threats Report, Q2 ‘10
Experts in Network Behavior Analysis
Page 18, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Up to 6000 different botnet
Command & Control (C&C)
servers are running every day
 Each botnet C&C controls an
average of 20,000 compromised
bots
 Some C&C servers manage
between 10’s & 100,000’s of bots
Symantec reported an average
of 52.771 new active bot-
infected computers per day
Arbor Networks Atlas - http://atlas.arbor.net/summary/botnets
ShadowServer Botnet Charts - www.shadowserver.org/wiki/pmwiki.php?n=
Stats.BotnetCharts
Experts in Network Behavior Analysis
Page 19, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Friday is the busiest day for
new threats to appear
May 13 - June 4, 2010
 Increased Zeus &
other botnet activity
McAfee Threats Report, Q1 ‘11
Experts in Network Behavior Analysis
Page 20, www.cognitive-security.com
© 2012, gdusil.wordpress.com
% breaches / % records
Verizon – ‘11 Data Breach Investigations Report
Experts in Network Behavior Analysis
Page 21, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Gartner estimates that the global market for dedicated NBA revenue
will be approximately $80 million in 2010 and will grow to
approximately $87 million in 2011
 Gartner
Collecting “everything” is typically considered overkill. Threat
Analysis at line speeds is expensive & unrealistic – NetFlow analysis
can scale to line speeds, & detect attacks
 Cisco
“…attacks have moved from defacement and general annoyance to
one-time attacks designed to steal as much data as possible.”
 HP
Cisco - Global Threat Report 2Q11
Gartner - Network Behavior Analysis Market, Nov ’10
HP – Cyber Security Risks Report (11.Sep)
Experts in Network Behavior Analysis
Page 22, www.cognitive-security.com
© 2012, gdusil.wordpress.comCisco - Global Threat Report 2Q11
Experts in Network Behavior Analysis
Page 23, www.cognitive-security.com
© 2012, gdusil.wordpress.comMcAfee – Revealed, Operation Shady RAT
Experts in Network Behavior Analysis
Page 24, www.cognitive-security.com
© 2012, gdusil.wordpress.com
http://dealbook.nytimes.com/2011/03/18/ex-goldman-programmer-
sentenced-to-8-years-for-theft-of-trading-code/
Experts in Network Behavior Analysis
Page 25, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 26, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Challenges
 Integrate with SIEM
 Provide a way for automated blocking
 Handling of high bandwidth traffic
 Mapping IP addresses to subscribers
 Processing of incidents
 5x7 and 24x7 support
 Handling links with minimum latency
 No additional point-of-failure
 No modifications of the existing infrastructure
 Integrate into the existing reporting
Experts in Network Behavior Analysis
Page 27, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Protect critical network
infrastructure
 Legacy network
 Traffic going to the Internet
 Internal VOIP traffic
Protect Cable & GPRS
subscribers
 Botnets
 DNS attacks
 Zero-day attacks
 Low-profile attacks
 SYN flood & ICPM attacks
 Service misuse
Protection against
APT, zero-day attacks, botnets
and polymorphic malware
Experts in Network Behavior Analysis
Page 28, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Protection of design secrets
 Throughout the R&D process
 High-end databases from theft
Databases contain
development & testing of new
compounds & medicines.
 Theft of Intellectual Property
 Secrets lost to competitors or
foreign governments
Security is needed to protect
Corporate Assets
 Sales Force Automation, Channel
Management, CRM systems,
Internet Marketing
C-T.P.A.T - Customs & Trade Partnership Against Terrorism,
http://www.cbp.gov/xp/cgov/import/commercial_enforcement/ct
pat/
Experts in Network Behavior Analysis
Page 29, www.cognitive-security.com
© 2012, gdusil.wordpress.com
A Global Industry
 Exposed to security risks from
competitors or government
sponsored attacks
Supply Chain Security
 R&D  chemicals  production
 sales channels
 Cross-Country & Cross-Company
 Indian & Chinese emergence
 Chemicals used for terrorism
Mandatory retention of data
 Protection from APT attacks
 Unauthorized access from both
internal and external agents
REACH - Registration, Evaluation, Authorization and Restriction of
Chemicals is a European Union law, regulation 2006/1907 of 18
December 2006. - REACH covers the production and use of
Experts in Network Behavior Analysis
Page 30, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Cybersquatting
 Registration of domain
names containing a brand,
slogan or trademark to
which the registrant has
no rights
Understanding the
topology across
the Supply Chain
can assist security
experts in
identifying potential
weak spots
UKSPA - What are the top security threats facing the research sector? -
http://www.ukspa.org.uk/news/content/2562/what_are_the_top_security_th
reats_facing_the_research_sector
Experts in Network Behavior Analysis
Page 31, www.cognitive-security.com
© 2012, gdusil.wordpress.com
BehavioralAnalysis
Cyber-Attack Detection
Attack LocationID
IPorAS blocking
Security Monitoring
MaximizeQoS
RiskAnalysis
Incident Response
Attack Validation
BlockingPolicies
InformSubscriber
IP = Internet Protocol, AS = Autonomous System, QoS =
Quality of Service, SRMB = Security Risk Minimal
Blocking
Experts in Network Behavior Analysis
Page 32, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Combining the above approaches can help security teams more
quickly identify and remediate intrusions and help avoid potential
losses.
Cisco - Global Threat Report 2Q11
Collaborate
& share
knowledge.
Baseline, to
detect
anomalous
events.
Use location
IDs so alerts
are more
“human-
readable,”
Take an
analytical
approach to
detecting
APTs.
Using
NetFlow to
support
incident
response
Experts in Network Behavior Analysis
Page 33, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 34, www.cognitive-security.com
© 2012, gdusil.wordpress.com
“Advanced Persistent Threats”, orAPTs, refers low-level attacks used
collectively to launch a targeted & prolonged attack. The goal is to gain
maximum control into the target organization.APTs pose serious concerns
to a security management team, especially asAPT toolkits become
commercially and globally available. Today’s threats involve polymorphic
malware and other techniques that are designed to evade traditional
security measures. Best-in-class security solutions now require controls
that do not rely on signature-based detection, sinceAPTs are “signature-
aware”, and designed to bypass traditional security layers. New methods
are needed to combat these new threats such as BehavioralAnalysis.
Network BehaviorAnalysis proactively detects and blocks suspicious
behavior before significant damage can be done by the perpetrator. This
presentation provides some valuable statistics in the growing threat of
APTs.
Experts in Network Behavior Analysis
Page 35, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Network Behavior Analysis, NBA, Cyber Attacks, ForensicsAnalysis,
Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident
Response, Security as a Service, SaaS, Managed Security Services,
MSS, Monitoring & Management,Advanced Persistent Threats,APT,
Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern
SophisticatedAttacks, MSA, Non-Signature Detection,Artificial
Intelligence,A.I., AI, Security Innovation, Mobile security, Cognitive
Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil

More Related Content

What's hot

Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...CODE BLUE
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 

What's hot (20)

Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Hacking3e ppt ch01
Hacking3e ppt ch01Hacking3e ppt ch01
Hacking3e ppt ch01
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Hacking3e ppt ch06
Hacking3e ppt ch06Hacking3e ppt ch06
Hacking3e ppt ch06
 
Hacking3e ppt ch10
Hacking3e ppt ch10Hacking3e ppt ch10
Hacking3e ppt ch10
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 

Viewers also liked

Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking ReportSynack
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Securityscoopnewsgroup
 
Ten query tuning techniques every SQL Server programmer should know
Ten query tuning techniques every SQL Server programmer should knowTen query tuning techniques every SQL Server programmer should know
Ten query tuning techniques every SQL Server programmer should knowKevin Kline
 
Three Secrets to Communicating with Confidence & Influence
Three Secrets to Communicating with Confidence & InfluenceThree Secrets to Communicating with Confidence & Influence
Three Secrets to Communicating with Confidence & InfluenceKim Adams
 
Selective medium for isolating phanerochaete chrysosporium
Selective medium for isolating phanerochaete chrysosporiumSelective medium for isolating phanerochaete chrysosporium
Selective medium for isolating phanerochaete chrysosporiumDr. sreeremya S
 
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...Takehiko Ito
 
Libro proyecto alternativo de nacion
Libro proyecto alternativo de nacionLibro proyecto alternativo de nacion
Libro proyecto alternativo de nacionMartin Triana
 
CLIL: Teaching History to Language Learners
 CLIL: Teaching History to Language Learners CLIL: Teaching History to Language Learners
CLIL: Teaching History to Language LearnersShelly Sanchez Terrell
 
Tarea 1.1 Grupos de alimentos
Tarea 1.1 Grupos de alimentosTarea 1.1 Grupos de alimentos
Tarea 1.1 Grupos de alimentosCharo Saornil
 
Customize it! Make IBM Connections look your way
Customize it! Make IBM Connections look your way Customize it! Make IBM Connections look your way
Customize it! Make IBM Connections look your way Klaus Bild
 
Shifting to Customer-Centric Marketing for Ecommerce
Shifting to Customer-Centric Marketing for EcommerceShifting to Customer-Centric Marketing for Ecommerce
Shifting to Customer-Centric Marketing for EcommerceJoyce Qian
 
Phils Session cards @ Measurecamp
Phils Session cards @ MeasurecampPhils Session cards @ Measurecamp
Phils Session cards @ MeasurecampPhil Pearce
 

Viewers also liked (15)

Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking Report
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Ten query tuning techniques every SQL Server programmer should know
Ten query tuning techniques every SQL Server programmer should knowTen query tuning techniques every SQL Server programmer should know
Ten query tuning techniques every SQL Server programmer should know
 
Three Secrets to Communicating with Confidence & Influence
Three Secrets to Communicating with Confidence & InfluenceThree Secrets to Communicating with Confidence & Influence
Three Secrets to Communicating with Confidence & Influence
 
Modelo Del Prisma
Modelo Del PrismaModelo Del Prisma
Modelo Del Prisma
 
Selective medium for isolating phanerochaete chrysosporium
Selective medium for isolating phanerochaete chrysosporiumSelective medium for isolating phanerochaete chrysosporium
Selective medium for isolating phanerochaete chrysosporium
 
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...
G265 小平朋江・いとうたけひこ (2017, 3月). 精神障害当事者の自己開示とリカバリー:メンタルヘルスマガジン『こころの元気+』表紙モデルの動機...
 
Why Do Younger Consumers Oppose EMV Technology?
Why Do Younger Consumers Oppose EMV Technology?Why Do Younger Consumers Oppose EMV Technology?
Why Do Younger Consumers Oppose EMV Technology?
 
Libro proyecto alternativo de nacion
Libro proyecto alternativo de nacionLibro proyecto alternativo de nacion
Libro proyecto alternativo de nacion
 
CLIL: Teaching History to Language Learners
 CLIL: Teaching History to Language Learners CLIL: Teaching History to Language Learners
CLIL: Teaching History to Language Learners
 
Tarea 1.1 Grupos de alimentos
Tarea 1.1 Grupos de alimentosTarea 1.1 Grupos de alimentos
Tarea 1.1 Grupos de alimentos
 
Customize it! Make IBM Connections look your way
Customize it! Make IBM Connections look your way Customize it! Make IBM Connections look your way
Customize it! Make IBM Connections look your way
 
Shifting to Customer-Centric Marketing for Ecommerce
Shifting to Customer-Centric Marketing for EcommerceShifting to Customer-Centric Marketing for Ecommerce
Shifting to Customer-Centric Marketing for Ecommerce
 
Phils Session cards @ Measurecamp
Phils Session cards @ MeasurecampPhils Session cards @ Measurecamp
Phils Session cards @ Measurecamp
 
Impact of Agile on HR
Impact of Agile on HRImpact of Agile on HR
Impact of Agile on HR
 

Similar to Cognitive Security - Anatomy of Advanced Persistent Threats ('12)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Mahbubul Alam
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009RCioffi
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 

Similar to Cognitive Security - Anatomy of Advanced Persistent Threats ('12) (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Cognitive Security - Anatomy of Advanced Persistent Threats ('12)

  • 2. Experts in Network Behavior Analysis Page 2, www.cognitive-security.com © 2012, gdusil.wordpress.com Download the native PowerPoint slides here:  http://gdusil.wordpress.com/2012/04/15/anatomy-of-advanced-persistent- threats/ Or, check out other articles on my blog:  http://gdusil.wordpress.com
  • 3. Experts in Network Behavior Analysis Page 3, www.cognitive-security.com © 2012, gdusil.wordpress.com Old threats were IT Oriented  Fame & Politics  Boredom & Personal Challenge New threats focus on ROI  Fraud & Theft Criminals now take a strategic approach to cybercrime  Companies now compensate by building higher walls Battles may have been won & lost on both sides… …But the war is far from over.
  • 4. Experts in Network Behavior Analysis Page 4, www.cognitive-security.com © 2012, gdusil.wordpress.com 4 People + Process + Technology = Business Challenges
  • 5. Experts in Network Behavior Analysis Page 5, www.cognitive-security.com © 2012, gdusil.wordpress.com • A bug, glitch, hole, or flaw in a network, application or database • Attack developed to take advantage of a vulnerability • Attack on a selection of vulnerabilities to control a network, device, or asset • Software designed to fix a vulnerability and otherwise plug security holes • Attack against an unknown vulnerability, with no known security fix  Methodical, long- term covert attacks, using many tools to steal info
  • 6. Experts in Network Behavior Analysis Page 6, www.cognitive-security.com © 2012, gdusil.wordpress.com Blended Threats • Include embedded URLs that link toan infected Webpage • Employsocial engineering to encourage click-through. Infected Websites • Victim visits legitimate site infected by malware (eg. CrossSite Scripting, oriFramecompromise) Malware Tools • Back-door downloaders, keyloggers, scanners & PWstealers • Polymorphic design toescapeAV detection Infected PC(bots) • Onceinside the, infiltrating orcompromisingdata is easy • SomeDDoS attackscan originate frominternal workstations Command& Control(C2) • Remoteservers operated by attackercontrol victim PCs • Activity occursoutside ofthenormalhours, to evade detection Management Console • Interface used tocontrol all aspects of theAPTprocess • Enables attackerstoinstall new malware &measuresuccess
  • 7. Experts in Network Behavior Analysis Page 7, www.cognitive-security.com © 2012, gdusil.wordpress.com Advanced Persistent Threats Heavy DNS Use & Sophisticated Scans Periodic Polling - Command & Control Unexpected new service or Outlier ClientOutbound Encrypted sessions (eg. SSH) Peer 2 Peer Network Behavior Unclassified Behavior - Unexpected Anomaly
  • 8. Experts in Network Behavior Analysis Page 8, www.cognitive-security.com © 2012, gdusil.wordpress.com Web Browsers  IE, Firefox, Opera, Safari, Plugins Applications  Adobe Flash, Codecs, QuickTime Rich Complex Environments  Java, Flash, Silverlight, .NET & J2EE % of Security Attacks % of Security Spending 8.Web 7.App • HTTP,SMTP, FTP Presentation • SSL,TLS 5.Session • TCP,SIP 4.Transport • TCP,UDP 3.Network • IP 2.Data • 802.11,FDDI,ATM 1.Physical • 1000Base-T, E1 80% Apps 10%App 90% Network 20% Network
  • 9. Experts in Network Behavior Analysis Page 9, www.cognitive-security.com © 2012, gdusil.wordpress.comIBM - X-Force (Mid-year Trend & Risk Report '11
  • 10. Experts in Network Behavior Analysis Page 10, www.cognitive-security.com © 2012, gdusil.wordpress.comIBM - X-Force (Mid-year Trend & Risk Report '11
  • 11. Experts in Network Behavior Analysis Page 11, www.cognitive-security.com © 2012, gdusil.wordpress.com “The Zeus Trojan…, ….will continue to receive significant investment from cybercriminals in 2011.” “The aptly named Zeus,… …targeting everything from bank accounts to government networks, has become extremely sophisticated and is much more.” Cisco - Annual Security Report '11
  • 12. Experts in Network Behavior Analysis Page 12, www.cognitive-security.com © 2012, gdusil.wordpress.com “Going into 2012, security experts are watching vulnerabilities in industrial control systems & supervisory control & data acquisition systems, also known as ICS/SCADA.” Cisco - Annual Security Report '11
  • 13. Experts in Network Behavior Analysis Page 13, www.cognitive-security.com © 2012, gdusil.wordpress.comCisco - Annual Security Report '11
  • 14. Experts in Network Behavior Analysis Page 14, www.cognitive-security.com © 2012, gdusil.wordpress.com  “[Hacking] Breaches… …can be because they may contain sensitive data on clients as well as employees that even an average attacker can sell on the underground economy.” Source: OSF DataLoss DB, Symantec – Internet Security Threat Report ‘11.Apr
  • 15. Experts in Network Behavior Analysis Page 15, www.cognitive-security.com © 2012, gdusil.wordpress.com*Verizon – ‘11 Data Breach Investigations Report
  • 16. Experts in Network Behavior Analysis Page 16, www.cognitive-security.com © 2012, gdusil.wordpress.com % breaches / % records footprinting and fingerprinting) - automated scans for open ports & services
  • 17. Experts in Network Behavior Analysis Page 17, www.cognitive-security.com © 2012, gdusil.wordpress.com Primarily targets are bank accounts McAfee Threats Report, Q2 ‘10
  • 18. Experts in Network Behavior Analysis Page 18, www.cognitive-security.com © 2012, gdusil.wordpress.com Up to 6000 different botnet Command & Control (C&C) servers are running every day  Each botnet C&C controls an average of 20,000 compromised bots  Some C&C servers manage between 10’s & 100,000’s of bots Symantec reported an average of 52.771 new active bot- infected computers per day Arbor Networks Atlas - http://atlas.arbor.net/summary/botnets ShadowServer Botnet Charts - www.shadowserver.org/wiki/pmwiki.php?n= Stats.BotnetCharts
  • 19. Experts in Network Behavior Analysis Page 19, www.cognitive-security.com © 2012, gdusil.wordpress.com Friday is the busiest day for new threats to appear May 13 - June 4, 2010  Increased Zeus & other botnet activity McAfee Threats Report, Q1 ‘11
  • 20. Experts in Network Behavior Analysis Page 20, www.cognitive-security.com © 2012, gdusil.wordpress.com % breaches / % records Verizon – ‘11 Data Breach Investigations Report
  • 21. Experts in Network Behavior Analysis Page 21, www.cognitive-security.com © 2012, gdusil.wordpress.com Gartner estimates that the global market for dedicated NBA revenue will be approximately $80 million in 2010 and will grow to approximately $87 million in 2011  Gartner Collecting “everything” is typically considered overkill. Threat Analysis at line speeds is expensive & unrealistic – NetFlow analysis can scale to line speeds, & detect attacks  Cisco “…attacks have moved from defacement and general annoyance to one-time attacks designed to steal as much data as possible.”  HP Cisco - Global Threat Report 2Q11 Gartner - Network Behavior Analysis Market, Nov ’10 HP – Cyber Security Risks Report (11.Sep)
  • 22. Experts in Network Behavior Analysis Page 22, www.cognitive-security.com © 2012, gdusil.wordpress.comCisco - Global Threat Report 2Q11
  • 23. Experts in Network Behavior Analysis Page 23, www.cognitive-security.com © 2012, gdusil.wordpress.comMcAfee – Revealed, Operation Shady RAT
  • 24. Experts in Network Behavior Analysis Page 24, www.cognitive-security.com © 2012, gdusil.wordpress.com http://dealbook.nytimes.com/2011/03/18/ex-goldman-programmer- sentenced-to-8-years-for-theft-of-trading-code/
  • 25. Experts in Network Behavior Analysis Page 25, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 26. Experts in Network Behavior Analysis Page 26, www.cognitive-security.com © 2012, gdusil.wordpress.com Challenges  Integrate with SIEM  Provide a way for automated blocking  Handling of high bandwidth traffic  Mapping IP addresses to subscribers  Processing of incidents  5x7 and 24x7 support  Handling links with minimum latency  No additional point-of-failure  No modifications of the existing infrastructure  Integrate into the existing reporting
  • 27. Experts in Network Behavior Analysis Page 27, www.cognitive-security.com © 2012, gdusil.wordpress.com Protect critical network infrastructure  Legacy network  Traffic going to the Internet  Internal VOIP traffic Protect Cable & GPRS subscribers  Botnets  DNS attacks  Zero-day attacks  Low-profile attacks  SYN flood & ICPM attacks  Service misuse Protection against APT, zero-day attacks, botnets and polymorphic malware
  • 28. Experts in Network Behavior Analysis Page 28, www.cognitive-security.com © 2012, gdusil.wordpress.com Protection of design secrets  Throughout the R&D process  High-end databases from theft Databases contain development & testing of new compounds & medicines.  Theft of Intellectual Property  Secrets lost to competitors or foreign governments Security is needed to protect Corporate Assets  Sales Force Automation, Channel Management, CRM systems, Internet Marketing C-T.P.A.T - Customs & Trade Partnership Against Terrorism, http://www.cbp.gov/xp/cgov/import/commercial_enforcement/ct pat/
  • 29. Experts in Network Behavior Analysis Page 29, www.cognitive-security.com © 2012, gdusil.wordpress.com A Global Industry  Exposed to security risks from competitors or government sponsored attacks Supply Chain Security  R&D  chemicals  production  sales channels  Cross-Country & Cross-Company  Indian & Chinese emergence  Chemicals used for terrorism Mandatory retention of data  Protection from APT attacks  Unauthorized access from both internal and external agents REACH - Registration, Evaluation, Authorization and Restriction of Chemicals is a European Union law, regulation 2006/1907 of 18 December 2006. - REACH covers the production and use of
  • 30. Experts in Network Behavior Analysis Page 30, www.cognitive-security.com © 2012, gdusil.wordpress.com Cybersquatting  Registration of domain names containing a brand, slogan or trademark to which the registrant has no rights Understanding the topology across the Supply Chain can assist security experts in identifying potential weak spots UKSPA - What are the top security threats facing the research sector? - http://www.ukspa.org.uk/news/content/2562/what_are_the_top_security_th reats_facing_the_research_sector
  • 31. Experts in Network Behavior Analysis Page 31, www.cognitive-security.com © 2012, gdusil.wordpress.com BehavioralAnalysis Cyber-Attack Detection Attack LocationID IPorAS blocking Security Monitoring MaximizeQoS RiskAnalysis Incident Response Attack Validation BlockingPolicies InformSubscriber IP = Internet Protocol, AS = Autonomous System, QoS = Quality of Service, SRMB = Security Risk Minimal Blocking
  • 32. Experts in Network Behavior Analysis Page 32, www.cognitive-security.com © 2012, gdusil.wordpress.com Combining the above approaches can help security teams more quickly identify and remediate intrusions and help avoid potential losses. Cisco - Global Threat Report 2Q11 Collaborate & share knowledge. Baseline, to detect anomalous events. Use location IDs so alerts are more “human- readable,” Take an analytical approach to detecting APTs. Using NetFlow to support incident response
  • 33. Experts in Network Behavior Analysis Page 33, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 34. Experts in Network Behavior Analysis Page 34, www.cognitive-security.com © 2012, gdusil.wordpress.com “Advanced Persistent Threats”, orAPTs, refers low-level attacks used collectively to launch a targeted & prolonged attack. The goal is to gain maximum control into the target organization.APTs pose serious concerns to a security management team, especially asAPT toolkits become commercially and globally available. Today’s threats involve polymorphic malware and other techniques that are designed to evade traditional security measures. Best-in-class security solutions now require controls that do not rely on signature-based detection, sinceAPTs are “signature- aware”, and designed to bypass traditional security layers. New methods are needed to combat these new threats such as BehavioralAnalysis. Network BehaviorAnalysis proactively detects and blocks suspicious behavior before significant damage can be done by the perpetrator. This presentation provides some valuable statistics in the growing threat of APTs.
  • 35. Experts in Network Behavior Analysis Page 35, www.cognitive-security.com © 2012, gdusil.wordpress.com Network Behavior Analysis, NBA, Cyber Attacks, ForensicsAnalysis, Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident Response, Security as a Service, SaaS, Managed Security Services, MSS, Monitoring & Management,Advanced Persistent Threats,APT, Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern SophisticatedAttacks, MSA, Non-Signature Detection,Artificial Intelligence,A.I., AI, Security Innovation, Mobile security, Cognitive Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil