masquerading malicious dns traffic
play

Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, - PowerPoint PPT Presentation

Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, Spark David Rodriguez March 28, 2019 The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark The Outline Masquerading Time Series


  1. Masquerading Malicious DNS Traffic Bayesian Inference, Rainier, Spark David Rodriguez March 28, 2019

  2. The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  3. The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  4. Cisco Umbrella DNS Resolution

  5. Part 1 DNS Resolution 180 Billion Cisco Umbrella Per Day Many Web Server Mail More IP Server DNS Address Records

  6. Part 1 Protection 101 Ransomware Malvertising Worms Phishing Virus Compromised Account

  7. Part 1 Definition Masquerading Traffic = Masquerading Users + Compromised Websites

  8. Part 1 Masquerading Users Email Browsing PDF Viewer Internet Text Editor SSH Keys

  9. Part 1 Compromised Websites Typical Visitors Compromised Phished Server Malicious Webpage Browser Redirect Backdoor Vulnerability

  10. Part 1 Masquerading DNS Traffic Typical Vistor DNS Atypical Traffic Vistor

  11. Part 1 Emotet Campaign Malware Downloaded Emotet Runs Code in Process and Registers Computer with C2 Server Masquerading Traffic Links or Macros Make DNS Requests Phishing Email User Click Links or Opens Attachments to Email

  12. Part 1 Emotet Campaign

  13. The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  14. Part 2 Time-Series Analysis Extreme Outliers Expected Non-Zero Volume Expected Zero Volume

  15. Part 2 Time-Series Analysis Probability of Demand Expected Demand when non-zero

  16. Part 2 Croston’s Method Spark Trended Volume Data Pipeline Store Spark Table Join Spark Spark Historical Table Table Note :

  17. Part 2 Bayesian Approach X Y Probability Distribution Probability of Demand Expected Demand when non-zero

  18. Part 2 Bayesian Approach Outliers Non-Zero Outliers Distribution Zero Distribution 0 1 2 3 4 5 6 7 8 9

  19. Part 2 Mixture Models

  20. Part 2 Discrete Models

  21. Part 2 Continuous Models

  22. The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  23. Part 3 MCMC Methods Rejection of Samples Sampling Observations From Distribution Proposed Distribution

  24. Part 3 MCMC Methods

  25. Part 3 Rainier Depending on your background, you might think of Rainier as aspiring to be either: “ Stan, but on the JVM” or “ Tensorflow, but for small data” . ~ README

  26. Part 3 Rainier Methods

  27. Part 3 PyMC Methods

  28. Part 3 Rainier + Spark JVM Rainier Spark

  29. Part 3 Rainier + Spark Hourly Aggregations Spark Job 150 Million Paid-Level Domains Daily Aggregations Spark Job Spark Job Rainier Simulations Filtering Heuristics

  30. The Outline Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  31. Part 4 Window Based Difference Window 2 Window 1 Window 2 Window 1 Rainier Simulated Distribution Parameter Parameter Values Values

  32. Part 4 Window Simulations Week 2 Week 3 Week 4 Week 1

  33. Part 4 Outlier Window

  34. Part 4 Local Outlier to Global

  35. Closing Recap Masquerading Time Series Rainier Anomaly DNS Modeling + Detection Traffic Spark

  36. Closing Glossed Over Details Outliers Goodness of Fit

  37. Closing References A Review of Croston's method for intermittent demand forecasting https://www.researchgate.net/publication/254044245_A_Review_of_Croston's_method_for_intermittent_demand_forecasting Rainier https://github.com/stripe/rainier PyMC3 https://docs.pymc.io/ Emotet https://www.us-cert.gov/ncas/alerts/TA18-201A Bokeh Plots https://bokeh.pydata.org/en/latest/ Twitter Chill https://github.com/twitter/chill

  38. Closing Contact Website davidrdgz.github.io Github @davidrdgz Twitter @davidrdgz Email davrodr3 at cisco.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend