improved hunt seeding with specific anomaly scoring
play

Improved Hunt Seeding with Specific Anomaly Scoring Brenden Bishop - PowerPoint PPT Presentation

Introduction Finding Anomalies Example Conclusion References Improved Hunt Seeding with Specific Anomaly Scoring Brenden Bishop January 8, 2019 1/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring Introduction Finding


  1. Introduction Finding Anomalies Example Conclusion References Improved Hunt Seeding with Specific Anomaly Scoring Brenden Bishop January 8, 2019 1/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  2. Introduction Finding Anomalies Example Conclusion References 1 Introduction First things first Framing the problem 2 Finding Anomalies Density estimation Scoring 3 Example 4 Conclusion 2/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  3. Introduction Finding Anomalies Example Conclusion References First things first New presentation who dis? 3/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  4. Introduction Finding Anomalies Example Conclusion References First things first New presentation who dis? My formal training was in quantitative psychology and statistics at The Ohio State University, graduated 2017 3/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  5. Introduction Finding Anomalies Example Conclusion References First things first New presentation who dis? My formal training was in quantitative psychology and statistics at The Ohio State University, graduated 2017 Started at Columbus Collaboratory, working on a variety of projects, quite a bit of prototyping 3/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  6. Introduction Finding Anomalies Example Conclusion References First things first New presentation who dis? My formal training was in quantitative psychology and statistics at The Ohio State University, graduated 2017 Started at Columbus Collaboratory, working on a variety of projects, quite a bit of prototyping Love cyber projects because, by and large, one can actually measure all the stuff required to answer the question 3/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  7. Introduction Finding Anomalies Example Conclusion References First things first Hunting 4/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  8. Introduction Finding Anomalies Example Conclusion References First things first Hunting Hunting has become an integral component of mature cyber security operations 4/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  9. Introduction Finding Anomalies Example Conclusion References First things first Hunting Hunting has become an integral component of mature cyber security operations Network defenders spend a portion of their time hunting for vulnerabilities, misconfigurations, or previously unnoticed security events 4/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  10. Introduction Finding Anomalies Example Conclusion References First things first Hunting Hunting has become an integral component of mature cyber security operations Network defenders spend a portion of their time hunting for vulnerabilities, misconfigurations, or previously unnoticed security events The practice has evolved beyond grepping randomly through logs 4/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  11. Introduction Finding Anomalies Example Conclusion References First things first Hunting Hunting has become an integral component of mature cyber security operations Network defenders spend a portion of their time hunting for vulnerabilities, misconfigurations, or previously unnoticed security events The practice has evolved beyond grepping randomly through logs Hunts can now be seeded using ML/AI/Statistical models, leading to a directed search rather than a random walk 4/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  12. Introduction Finding Anomalies Example Conclusion References Framing the problem Sounds simple enough, but... 5/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  13. Introduction Finding Anomalies Example Conclusion References Framing the problem Sounds simple enough, but... 5/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  14. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  15. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 1 ”Find anything strange on the network” is not sufficiently specific 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  16. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 1 ”Find anything strange on the network” is not sufficiently specific (neither is “Find any lateral movement.”) 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  17. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 1 ”Find anything strange on the network” is not sufficiently specific (neither is “Find any lateral movement.”) Statistics requires problem identification, consideration of available variables, and understanding how observations arise 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  18. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 1 ”Find anything strange on the network” is not sufficiently specific (neither is “Find any lateral movement.”) Statistics requires problem identification, consideration of available variables, and understanding how observations arise 2 Cyber and statistics/data science folks can talk past one another 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  19. Introduction Finding Anomalies Example Conclusion References Framing the problem Challenges Frequent challenges when finding anomalies: 1 ”Find anything strange on the network” is not sufficiently specific (neither is “Find any lateral movement.”) Statistics requires problem identification, consideration of available variables, and understanding how observations arise 2 Cyber and statistics/data science folks can talk past one another 3 Unsupervised learning is prone to a high false alarm rate; Machine Learning/Artificial Intelligence/Automated-Inference are not immune 6/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  20. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  21. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 1 Scope problems appropriately (e.g. Find strange outbound connections to cloud storage.) 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  22. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 1 Scope problems appropriately (e.g. Find strange outbound connections to cloud storage.) 2 Cyber and statistics/AI/ML experts must iterate collaboratively; interdisciplinary teams are optimal for innovation 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  23. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 1 Scope problems appropriately (e.g. Find strange outbound connections to cloud storage.) 2 Cyber and statistics/AI/ML experts must iterate collaboratively; interdisciplinary teams are optimal for innovation 3 Turn big data into managable data, and, where possible, turn unsupervised problems into supervised. Collect data and validate models 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  24. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 1 Scope problems appropriately (e.g. Find strange outbound connections to cloud storage.) 2 Cyber and statistics/AI/ML experts must iterate collaboratively; interdisciplinary teams are optimal for innovation 3 Turn big data into managable data, and, where possible, turn unsupervised problems into supervised. Collect data and validate models (practice security as a science) 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  25. Introduction Finding Anomalies Example Conclusion References Framing the problem Addressing challenges 1 Scope problems appropriately (e.g. Find strange outbound connections to cloud storage.) 2 Cyber and statistics/AI/ML experts must iterate collaboratively; interdisciplinary teams are optimal for innovation 3 Turn big data into managable data, and, where possible, turn unsupervised problems into supervised. Collect data and validate models (practice security as a science) The remainder of the talk essentially focuses on item three 7/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  26. Introduction Finding Anomalies Example Conclusion References Good news everyone 8/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

  27. Introduction Finding Anomalies Example Conclusion References Good news everyone Cyber security data is particularly well suited to statistical inference 9/21 Brenden Bishop Improved Hunt Seeding withSpecific Anomaly Scoring

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend