SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
AI for CyberSecurity
Satnam Singh, PhD
Chief Data Scientist
Acalvio Technologies
ODSC India
2019
Outline
• Information Security problem
• Deep learning for InfoSec
• Tor Traffic Detection
• CnC Detection
• Can we do something different?
Time to Act
Source: Verizon DBR, 2018
Data Breaches and Attacks
Source: M-Trends, 2019
Enterprise Network
SOC segment
Engineering
Internet
SOC
Ops Segment
Sales
Operations
Cloud
Information Security Problem
1. Network Security
2. Endpoint Security
3. Application Security
4. Data Security
5. Cloud Security
6. Web Security
7. Mobile Security
8. IoT Security
9. Transaction Security
10.Messaging Security
Ref: Momentum Cyber
Ref: Momentum Cyber
Basic Security Controls
• Boundary firewalls and internet gateways
• Malware protection
• Patch management
• Whitelisting and execution control
• Secure configuration
• Password policy
• User access control
• Incident management
Security Data Science
Security Data Sources
Network Logs
•Firewall
•IDS/IPS
•Network flow
•DNS
•Wi-fi
Easily into a few TBs of data per day
Endpoint Logs
•File System Changes
•Applications, Process,
OS logs
•Antivirus Alerts
Authentication Logs
• Windows Events
• Active Directory User Logs
• Privilege User
Evolution of Security Data Science
Time
Example 1: Cisco Encrypted Traffic Analysis
TK Keanini, “Machine Learning: The What and Why of AI,” RSA Conf’19
Example 2: Malware Detection
Joshua Saxe, Sophos, “Deep Neural Networks for Hackers: Methods, Applications,
and Open Source Tools,” BlackHat Conf’18
Example 3: MLsploit- Adversarial ML
GeorgiaTech & Intel https://mlsploit.github.io/
Deep Learning Use Cases
Network Security
1. Network intrusion detection (scanning, spoofing, etc.)
2. Application attack detection (OWASP-Top 10 attacks)
3. Phishing attack malicious URL detection
Endpoint Security
1. Malware detection and
classification
2. Spyware, Ransomware
detection
User Security
1. User behaviour Analytics
2. Detection of suspicious sign-in activities,
brute force attacks and infected devices
Case Study 1:
Tor Traffic Detection
Tor Network
Source: Distill networks
Adversaries use tor traffic for port scans, dark web
purchases, extortion and data exfiltration
Tor-nonTor Traffic - Dataset
Tor-nonTor Traffic - Dataset
Activity Details
Browsing HTTP, HTTPS traffic using Chrome and Firefox
Email Mails delivered via SMTP/S and received via POP3/SSL
and IMAP/SSL, Thunderbird client
Chat Facebook, Hangout, ICQ and IAM chat activities
Audio-streaming Spotify audio streaming
Video-streaming Youtube and Vimeo services over Chrome and Firefox
File transfer Skype file transfers, FTP over SSH, FTP over SSL traffic
sessions
VoIP Facebook, Hangout and Skype
Demo Using Tensorflow and Keras
Tor
Traffic
Classification
Unknown
scripts
Feature
f1
Feature f2
Non-Tor
Traffic
Case Study 2:
C&C Detection
Command and Control Detection
C&C domain examples:
• DGA based: gvludcvhcrjwmgq.in, uqvwxfrhhwreddf.yt
• non DGA based: thisisyourchangeqq.com, homejobsinstitute.biz
Ransomware
Malware
Enterprise Network
Main DB
Webserver
C&C server
Data
Command
Attacker
Update Models
DNS
data
Ranking of
Malicious
C&C
domains
C&C
domains
Classify benign vs
C&C domains using
LSTM
C&C Detection: Pipeline
Can we do something DIFFERENT?
2. Speed up the Defender1. Slowdown the Attacker
Deception
Deception+DL
Deep Learning Engine
PowerShell Log Analyzer
• Pros of DL in InfoSec:
• Find hidden patterns in big data - “Needle in the haystack”
• Able to correlate across events
• Cons of DL in InfoSec:
• Too many False Positives !!
• No labels —> Using ML, DL becomes difficult
• DL+ Deception - A unique Solution to find hidden threats
Summary

Contenu connexe

Tendances

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 

Tendances (20)

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Threat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & AcquisitionThreat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & Acquisition
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global Results
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 

Similaire à AI for CyberSecurity

FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast IFIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
ChereCheek752
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 

Similaire à AI for CyberSecurity (20)

InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast IFIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
The security story behind critical industrial networks
The security story behind critical industrial networks The security story behind critical industrial networks
The security story behind critical industrial networks
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy Li
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 

Plus de Satnam Singh

Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Satnam Singh
 
Big Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- SatnamBig Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- Satnam
Satnam Singh
 

Plus de Satnam Singh (10)

Probabilistic signals and systems satnam singh
Probabilistic signals and systems satnam singhProbabilistic signals and systems satnam singh
Probabilistic signals and systems satnam singh
 
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise SecurityThreat Hunting with Deceptive Defense and Splunk Enterprise Security
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
 
A Game between Adversary and AI Scientist
A Game between Adversary and AI ScientistA Game between Adversary and AI Scientist
A Game between Adversary and AI Scientist
 
Deep learning fundamentals workshop
Deep learning fundamentals workshopDeep learning fundamentals workshop
Deep learning fundamentals workshop
 
Deception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsDeception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary Movements
 
Using Deception to Detect and Profile Hidden Threats
Using Deception to Detect and Profile Hidden ThreatsUsing Deception to Detect and Profile Hidden Threats
Using Deception to Detect and Profile Hidden Threats
 
HawkEye : A Real-time Anomaly Detection System
HawkEye : A Real-time Anomaly Detection SystemHawkEye : A Real-time Anomaly Detection System
HawkEye : A Real-time Anomaly Detection System
 
India software developers conference 2013 Bangalore
India software developers conference 2013 BangaloreIndia software developers conference 2013 Bangalore
India software developers conference 2013 Bangalore
 
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
 
Big Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- SatnamBig Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- Satnam
 

Dernier

Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
HyderabadDolls
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 

Dernier (20)

Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 
Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about them
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 

AI for CyberSecurity

  • 1. AI for CyberSecurity Satnam Singh, PhD Chief Data Scientist Acalvio Technologies ODSC India 2019
  • 2. Outline • Information Security problem • Deep learning for InfoSec • Tor Traffic Detection • CnC Detection • Can we do something different?
  • 3. Time to Act Source: Verizon DBR, 2018
  • 4. Data Breaches and Attacks Source: M-Trends, 2019
  • 5. Enterprise Network SOC segment Engineering Internet SOC Ops Segment Sales Operations Cloud Information Security Problem 1. Network Security 2. Endpoint Security 3. Application Security 4. Data Security 5. Cloud Security 6. Web Security 7. Mobile Security 8. IoT Security 9. Transaction Security 10.Messaging Security
  • 8. Basic Security Controls • Boundary firewalls and internet gateways • Malware protection • Patch management • Whitelisting and execution control • Secure configuration • Password policy • User access control • Incident management
  • 10. Security Data Sources Network Logs •Firewall •IDS/IPS •Network flow •DNS •Wi-fi Easily into a few TBs of data per day Endpoint Logs •File System Changes •Applications, Process, OS logs •Antivirus Alerts Authentication Logs • Windows Events • Active Directory User Logs • Privilege User
  • 11. Evolution of Security Data Science Time
  • 12. Example 1: Cisco Encrypted Traffic Analysis TK Keanini, “Machine Learning: The What and Why of AI,” RSA Conf’19
  • 13. Example 2: Malware Detection Joshua Saxe, Sophos, “Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools,” BlackHat Conf’18
  • 14. Example 3: MLsploit- Adversarial ML GeorgiaTech & Intel https://mlsploit.github.io/
  • 15. Deep Learning Use Cases Network Security 1. Network intrusion detection (scanning, spoofing, etc.) 2. Application attack detection (OWASP-Top 10 attacks) 3. Phishing attack malicious URL detection Endpoint Security 1. Malware detection and classification 2. Spyware, Ransomware detection User Security 1. User behaviour Analytics 2. Detection of suspicious sign-in activities, brute force attacks and infected devices
  • 16. Case Study 1: Tor Traffic Detection
  • 17. Tor Network Source: Distill networks Adversaries use tor traffic for port scans, dark web purchases, extortion and data exfiltration
  • 19. Tor-nonTor Traffic - Dataset Activity Details Browsing HTTP, HTTPS traffic using Chrome and Firefox Email Mails delivered via SMTP/S and received via POP3/SSL and IMAP/SSL, Thunderbird client Chat Facebook, Hangout, ICQ and IAM chat activities Audio-streaming Spotify audio streaming Video-streaming Youtube and Vimeo services over Chrome and Firefox File transfer Skype file transfers, FTP over SSH, FTP over SSL traffic sessions VoIP Facebook, Hangout and Skype
  • 20. Demo Using Tensorflow and Keras Tor Traffic Classification Unknown scripts Feature f1 Feature f2 Non-Tor Traffic
  • 21. Case Study 2: C&C Detection
  • 22. Command and Control Detection C&C domain examples: • DGA based: gvludcvhcrjwmgq.in, uqvwxfrhhwreddf.yt • non DGA based: thisisyourchangeqq.com, homejobsinstitute.biz Ransomware Malware Enterprise Network Main DB Webserver C&C server Data Command Attacker
  • 23. Update Models DNS data Ranking of Malicious C&C domains C&C domains Classify benign vs C&C domains using LSTM C&C Detection: Pipeline
  • 24. Can we do something DIFFERENT?
  • 25. 2. Speed up the Defender1. Slowdown the Attacker
  • 27.
  • 31. • Pros of DL in InfoSec: • Find hidden patterns in big data - “Needle in the haystack” • Able to correlate across events • Cons of DL in InfoSec: • Too many False Positives !! • No labels —> Using ML, DL becomes difficult • DL+ Deception - A unique Solution to find hidden threats Summary