SlideShare une entreprise Scribd logo
1  sur  47
TOTEM: Threat Observation, Tracking, and Evaluation Model John J. Gerber CISSP, GCFA, GCIH, GISP, GSNA   “ A totem is any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe .” -- Merriam-Webster
TOTEM : Basic Idea ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is TOTEM? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Totemism  :  system of belief in which humans are said to have kinship or a mystical relationship with a spirit-being, such as an animal or plant. The entity, or totem, is thought to interact with a given kin group or an individual and to serve as their emblem or symbol.” --   Encyclopædia Britannica
Who Are You Guys? We are like dwarfs standing upon the shoulders of giants, and so able to see more and see farther than the ancients .  –  Bernard of Chartres     Setting an example is not the main means of influencing another, it is the only means.   –   Albert Einstein    
“ Danger ,  Will Robinson !” According to a May 6th  Wall Street Journal article , the Pentagon confirmed that it detected 360 million attempts to penetrate its networks in 2008, which is up from six million in 2006.     The Department of Defense also disclosed that it had spent $100 million in the past six months repairing damage from these cyber attacks.
“ Danger ,  Will Robinson !” (04/09/2009)   Electricity Grid in U.S. Penetrated By Spies  reported in  The Wall Street Journal .  Under the Bush administration, Congress approved  $17 billion  in secret funds to protect government networks. (05/09/2009)   FAA's Web Security Audit: 3,857 Vulnerabilities  security audit of the Web applications found 763 high risk, 504 medium risk, and 2,590 low risk vulnerabilities.  (04/21/2009)  Computer Spies Breach Fighter-Jet Project   reported in  The Wall Street Journal . Cyber spies have stolen  tens of terabytes  of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. (05/2009)  Inspector General report sent to the FAA  - Last year, hackers took control of FAA  critical network servers  and could have shut them down, which would have seriously disrupted the agency's mission-support network. (05/20/2009)  NARA suffers data breach  reported in  Federal Computer Week  - the missing drive contains  1T of data  with "more than 100,000 Social Security numbers (including Al Gore’s daughter), contact information (including addresses) for various Clinton administration officials, Secret Service and White House operating procedures, event logs, social gathering logs, political records and other highly sensitive information.  A Few Other Recent Government Occurrences
It is a Dangerous World “ IDSs have  failed  to provide value relative to its costs and will be obsolete by 2005.”  --  Richard  Stiennon , Gartner Analyst, 06/03 http://taosecurity.blogspot.com
It is a Dangerous World "The worldwide wireless LAN (WLAN) intrusion prevention system (IPS) market is on pace to reach $168 million in 2008, a  41 percent   increase  from 2007 revenue of $119 million, according to Gartner, Inc." -- Gartner Press Release, 09/18/2008 http://taosecurity.blogspot.com
Detection ,[object Object],[object Object],[object Object],[object Object]
ANL Federated IDS Data Sharing Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ANL Federated IDS Data Sharing Model (2)
ANL Federated IDS Data Sharing Model (3)
ANL Federated IDS Data Sharing Model (4)
Violent Felons in Large Urban Counties A majority (56%) of violent felons had a prior conviction record. Thirty-eight percent had a prior felony conviction and 15% had a previous conviction for a violent felony.
The More Sources the Better? ,[object Object],[object Object],[object Object]
Cooperative Protection Program (CPP) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Management ,[object Object],[object Object],[object Object],[object Object]
Trust and Reputation Modeling Techniques ,[object Object],[object Object],[object Object],[object Object]
Dilbert and Albert Einstein
CAMNEP: System Architecture System developed by Martin Rehak.
CAMNEP: System Architecture System developed by Martin Rehak. ,[object Object],[object Object],[object Object],[object Object]
CAMNEP: Multi-Source Trustfulness Integration
CAMNEP: Agent Specific Clusters
CAMNEP: Reporting
CAMNEP: Conclusions
Risk NIST publication  SP 800-30:  Risk Management Guide for Information Technology Systems . In the text we read: " Risk  is a function of the likelihood of a given  threat-source 's exercising a particular potential  vulnerability , and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system.“ " Vulnerability : A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy."
Topological Vulnerability Analysis (TVA) Approach Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole Basic idea : analyze and visualize vulnerability dependencies and attack paths for understanding overall security posture. Populate through automated network discovery, asset management, and vulnerability reporting technology.
Operating with Limited Data Seeing the forest through the trees.
Creating TOTEM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOTEM: What is the Point? How does one effectively distinguish false positives from actual threats? The answer may only be visible by looking at multiple sources with different levels of trust and doing a little aggregation and anomaly detection.  Our goal is to create attack road maps with weights/prioritizations in order to manage the possible risks.
TOTEM Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating TOTEM: Federated Model   The devil is in the details ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Shared by the Federated IDS Data Sharing Model   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Blacklists Provide Information # watchlist.security.org.my, contact mel@hackinthebox.org # ip/net, source, comment, name, last update (GMT+8) 202.99.11.99, http://www.dshield.org/ipsascii.html, Dshield: Top IPs, dshield-top-ips, 2009/05/13 95.215.76.0/22, www.spamhaus.org/drop/drop.lasso, Spamhaus Block List, spamhaus, 2009/05/13 114.80.67.30, www.emergingthreats.net/rules/bleeding-rbn.rules, ET RBN, rbn, 2009/05/13  122.1.21.148, www.emergingthreats.net/rules/bleeding-compromised.rules, ET, compromised, # domain type original_reference-why_it_was_listed note--pound sign=comment # notice notice duplication is not permitted 00.devoid.us malware  www.cyber-ta.org/malware-analysis/DNS.Cumulative.Summary  20090321 scan4lux.info fake_antivirus www.malwaredomainlist.com/update.php 20090505 junglemix.in phishing isc.sans.org/diary.html?storyid=6328 20090505 Wed May 13 07:59:03 CDT 2009 99.254.50.139 99.248.26.177 99.245.29.38 99.234.219.183
Other Blacklists Provide Information (2) Top 10 Blacklist Providers Using 266 IPs from malware. Using 235 IPs from rbn. Using 172 IPs from coolwebsearch and spamhaus. Using 55 IPs from rogue. Using 23 IPs from malspam. Using 20 IPs from dshield-top-blocks. Using 15 IPs from exploit and sql_injection. Using 13 IPs from spyware and trojan. Using 11 IPs from rogue_antivirus. Using 10 IPs from botnet. Total Blacklisted IPs Downloaded : 1214 Blacklisted IPs Added Today : 39
Sample Reports: Blacklist ,[object Object],[object Object],[object Object]
Sample Reports: Blacklist (2)
Signature Based Information Can be Useful In respect to Snort, we have been looking at trend information for awhile.
Sample Reports: Blacklist (3)
Sample Reports: Shuns ,[object Object],[object Object]
Sample Reports: Shuns (2)
Sample Reports: Shuns (3)
Sample Reports: Shuns (4)
There is a great deal of work yet to be done.  Some key areas to develop will be: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comments ,[object Object],[object Object],[object Object]
Comments ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
فرسایش سنگدان در طیور
فرسایش سنگدان در طیورفرسایش سنگدان در طیور
فرسایش سنگدان در طیورamin*
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...Adam Pennington
 
Adversary Emulation using CALDERA
Adversary Emulation using CALDERAAdversary Emulation using CALDERA
Adversary Emulation using CALDERAErik Van Buggenhout
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...MITRE ATT&CK
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CKGrow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CKMITRE ATT&CK
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple TeamPriyanka Aash
 
Exploring the x64
Exploring the x64Exploring the x64
Exploring the x64FFRI, Inc.
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsMITRE ATT&CK
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSMITRE ATT&CK
 
Mycotoxin effect on seed quality
Mycotoxin effect on seed quality Mycotoxin effect on seed quality
Mycotoxin effect on seed quality Sanggonda
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
 
ATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxMITRE ATT&CK
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 

Tendances (20)

Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
فرسایش سنگدان در طیور
فرسایش سنگدان در طیورفرسایش سنگدان در طیور
فرسایش سنگدان در طیور
 
Manual plagas de citricos end december 2018
Manual plagas de citricos end december 2018Manual plagas de citricos end december 2018
Manual plagas de citricos end december 2018
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
Adversary Emulation using CALDERA
Adversary Emulation using CALDERAAdversary Emulation using CALDERA
Adversary Emulation using CALDERA
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CKGrow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple Team
 
Exploring the x64
Exploring the x64Exploring the x64
Exploring the x64
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
Mycotoxin effect on seed quality
Mycotoxin effect on seed quality Mycotoxin effect on seed quality
Mycotoxin effect on seed quality
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
ATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/Linux
 
Network security
Network securityNetwork security
Network security
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 

En vedette

Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOUMichael Gough
 
Contributing to the WordPress Codex
Contributing to the WordPress CodexContributing to the WordPress Codex
Contributing to the WordPress CodexLorelle VanFossen
 
放下
放下放下
放下nonnon
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingThorsten Kamann
 
Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Lidia Pivovarova
 
Web 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsWeb 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsEmprende Futuro
 
Quality Movie Ppt Version Sample
Quality Movie Ppt Version SampleQuality Movie Ppt Version Sample
Quality Movie Ppt Version SampleAndrew Schwartz
 
Implementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesImplementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesJon Gatrell
 
Aviaq P
Aviaq PAviaq P
Aviaq Peka
 
Letters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communityLetters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communitySelena Deckelmann
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer ResearchJon Gatrell
 
Breizh camp adobe flex et les mobiles
Breizh camp   adobe flex et les mobilesBreizh camp   adobe flex et les mobiles
Breizh camp adobe flex et les mobilesMichael Chaize
 
Text Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionText Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionLidia Pivovarova
 

En vedette (20)

Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOU
 
Contributing to the WordPress Codex
Contributing to the WordPress CodexContributing to the WordPress Codex
Contributing to the WordPress Codex
 
放下
放下放下
放下
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte Frühling
 
Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.Михаил Александров. Индуктивное моделирование.
Михаил Александров. Индуктивное моделирование.
 
Web 2.0 for Financial Institutions
Web 2.0 for Financial InstitutionsWeb 2.0 for Financial Institutions
Web 2.0 for Financial Institutions
 
Teletreball
TeletreballTeletreball
Teletreball
 
4. open innov lifecycle
4. open innov lifecycle4. open innov lifecycle
4. open innov lifecycle
 
Quality Movie Ppt Version Sample
Quality Movie Ppt Version SampleQuality Movie Ppt Version Sample
Quality Movie Ppt Version Sample
 
Implementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to ReleasesImplementing Strategy: Roadmaps to Releases
Implementing Strategy: Roadmaps to Releases
 
Aviaq P
Aviaq PAviaq P
Aviaq P
 
Letters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres communityLetters from the open source trenches - Postgres community
Letters from the open source trenches - Postgres community
 
Boyarsky
BoyarskyBoyarsky
Boyarsky
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
Breizh camp adobe flex et les mobiles
Breizh camp   adobe flex et les mobilesBreizh camp   adobe flex et les mobiles
Breizh camp adobe flex et les mobiles
 
Claude11
Claude11Claude11
Claude11
 
Italy Powepoint Country
Italy Powepoint CountryItaly Powepoint Country
Italy Powepoint Country
 
Text Pattern Formation For Information Extraction
Text Pattern Formation For Information ExtractionText Pattern Formation For Information Extraction
Text Pattern Formation For Information Extraction
 

Similaire à TOTEM: Threat Observation, Tracking, and Evaluation Model

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerAmit Sheth
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecuritySaqib Chaudhry
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Matthew Kurnava
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speedSreejith.D. Menon
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...csandit
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...cscpconf
 

Similaire à TOTEM: Threat Observation, Tracking, and Evaluation Model (20)

Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft Power
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
 
C3602021025
C3602021025C3602021025
C3602021025
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
 

Dernier

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Dernier (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

TOTEM: Threat Observation, Tracking, and Evaluation Model

  • 1. TOTEM: Threat Observation, Tracking, and Evaluation Model John J. Gerber CISSP, GCFA, GCIH, GISP, GSNA “ A totem is any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe .” -- Merriam-Webster
  • 2.
  • 3.
  • 4. Who Are You Guys? We are like dwarfs standing upon the shoulders of giants, and so able to see more and see farther than the ancients .  – Bernard of Chartres     Setting an example is not the main means of influencing another, it is the only means. –  Albert Einstein    
  • 5. “ Danger , Will Robinson !” According to a May 6th Wall Street Journal article , the Pentagon confirmed that it detected 360 million attempts to penetrate its networks in 2008, which is up from six million in 2006.     The Department of Defense also disclosed that it had spent $100 million in the past six months repairing damage from these cyber attacks.
  • 6. “ Danger , Will Robinson !” (04/09/2009) Electricity Grid in U.S. Penetrated By Spies reported in The Wall Street Journal . Under the Bush administration, Congress approved $17 billion in secret funds to protect government networks. (05/09/2009) FAA's Web Security Audit: 3,857 Vulnerabilities security audit of the Web applications found 763 high risk, 504 medium risk, and 2,590 low risk vulnerabilities.  (04/21/2009) Computer Spies Breach Fighter-Jet Project reported in The Wall Street Journal . Cyber spies have stolen tens of terabytes of design data on the US's most expensive costliest weapons system -- the $300 billion Joint Strike Fighter project. (05/2009) Inspector General report sent to the FAA - Last year, hackers took control of FAA critical network servers and could have shut them down, which would have seriously disrupted the agency's mission-support network. (05/20/2009) NARA suffers data breach reported in Federal Computer Week - the missing drive contains 1T of data with "more than 100,000 Social Security numbers (including Al Gore’s daughter), contact information (including addresses) for various Clinton administration officials, Secret Service and White House operating procedures, event logs, social gathering logs, political records and other highly sensitive information. A Few Other Recent Government Occurrences
  • 7. It is a Dangerous World “ IDSs have failed to provide value relative to its costs and will be obsolete by 2005.”  -- Richard Stiennon , Gartner Analyst, 06/03 http://taosecurity.blogspot.com
  • 8. It is a Dangerous World "The worldwide wireless LAN (WLAN) intrusion prevention system (IPS) market is on pace to reach $168 million in 2008, a 41 percent increase from 2007 revenue of $119 million, according to Gartner, Inc." -- Gartner Press Release, 09/18/2008 http://taosecurity.blogspot.com
  • 9.
  • 10.
  • 11. ANL Federated IDS Data Sharing Model (2)
  • 12. ANL Federated IDS Data Sharing Model (3)
  • 13. ANL Federated IDS Data Sharing Model (4)
  • 14. Violent Felons in Large Urban Counties A majority (56%) of violent felons had a prior conviction record. Thirty-eight percent had a prior felony conviction and 15% had a previous conviction for a violent felony.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Dilbert and Albert Einstein
  • 21. CAMNEP: System Architecture System developed by Martin Rehak.
  • 22.
  • 27. Risk NIST publication SP 800-30: Risk Management Guide for Information Technology Systems . In the text we read: " Risk is a function of the likelihood of a given threat-source 's exercising a particular potential vulnerability , and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system.“ " Vulnerability : A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy."
  • 28. Topological Vulnerability Analysis (TVA) Approach Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole Basic idea : analyze and visualize vulnerability dependencies and attack paths for understanding overall security posture. Populate through automated network discovery, asset management, and vulnerability reporting technology.
  • 29. Operating with Limited Data Seeing the forest through the trees.
  • 30.
  • 31. TOTEM: What is the Point? How does one effectively distinguish false positives from actual threats? The answer may only be visible by looking at multiple sources with different levels of trust and doing a little aggregation and anomaly detection.  Our goal is to create attack road maps with weights/prioritizations in order to manage the possible risks.
  • 32.
  • 33.
  • 34.
  • 35. Other Blacklists Provide Information # watchlist.security.org.my, contact mel@hackinthebox.org # ip/net, source, comment, name, last update (GMT+8) 202.99.11.99, http://www.dshield.org/ipsascii.html, Dshield: Top IPs, dshield-top-ips, 2009/05/13 95.215.76.0/22, www.spamhaus.org/drop/drop.lasso, Spamhaus Block List, spamhaus, 2009/05/13 114.80.67.30, www.emergingthreats.net/rules/bleeding-rbn.rules, ET RBN, rbn, 2009/05/13  122.1.21.148, www.emergingthreats.net/rules/bleeding-compromised.rules, ET, compromised, # domain type original_reference-why_it_was_listed note--pound sign=comment # notice notice duplication is not permitted 00.devoid.us malware www.cyber-ta.org/malware-analysis/DNS.Cumulative.Summary 20090321 scan4lux.info fake_antivirus www.malwaredomainlist.com/update.php 20090505 junglemix.in phishing isc.sans.org/diary.html?storyid=6328 20090505 Wed May 13 07:59:03 CDT 2009 99.254.50.139 99.248.26.177 99.245.29.38 99.234.219.183
  • 36. Other Blacklists Provide Information (2) Top 10 Blacklist Providers Using 266 IPs from malware. Using 235 IPs from rbn. Using 172 IPs from coolwebsearch and spamhaus. Using 55 IPs from rogue. Using 23 IPs from malspam. Using 20 IPs from dshield-top-blocks. Using 15 IPs from exploit and sql_injection. Using 13 IPs from spyware and trojan. Using 11 IPs from rogue_antivirus. Using 10 IPs from botnet. Total Blacklisted IPs Downloaded : 1214 Blacklisted IPs Added Today : 39
  • 37.
  • 39. Signature Based Information Can be Useful In respect to Snort, we have been looking at trend information for awhile.
  • 41.
  • 45.
  • 46.
  • 47.

Notes de l'éditeur

  1. What is in a name? Entity that watches over = OS Totem Pole = OpenBSD (original): http://freebsd-image-gallery.netcode.pl/_bsd-daemon/BSD-newhead.jpg OpenBSD: Puffy as Tron: http://www.openbsd.org/images/tshirt-31.jpg Apple Mac OS X finder: http://images.apple.com/macosx/features/images/sidenav_finder_20071016.png FreeBSD: http://logo-contest.freebsd.org/result/ Tux: Dark Templar by Neohin: http://tux.crystalxp.net/en.id.6952-neoshin-dark-templar.html Windows Security: http://windowshelp.microsoft.com/Windows/en-AU/security.mspx